The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

House Logo

House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.

0
Bitwarden Logo

Secure and manage passwords across devices with Bitwarden's open-source, encrypted password manager.

0
AWS Config Logo

Assess, audit, and evaluate configurations of AWS resources.

0
nbdserver Logo

A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.

0
Cisco Secure Endpoint Logo

Cisco Secure Endpoint is a cloud-native endpoint security solution that provides advanced protection and response to threats.

0
ProbeDroid Logo

Dynamic Java code instrumentation kit for Android applications.

0
Cybereason Defense Platform Logo

Unified defense platform providing endpoint protection, extended detection and response, threat hunting, and digital forensics and incident response.

0
The CyberWire Logo

Sysreptor offers a customizable reporting solution for penetration testing and red teaming.

0
LfLe Logo

Recover event log entries from an image by heuristically looking for record structures.

0
CloudGoat Logo

CloudGoat is a vulnerable-by-design AWS deployment tool that creates intentionally insecure cloud environments for hands-on cybersecurity training through capture-the-flag scenarios.

0
password_compat Logo

A library for forward compatibility with PHP password functions.

0
DorkSearch Logo

An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.

0
YARA package for Sublime Text Logo

YARA plugin for Sublime Text with syntax highlighting and snippets.

0
CAPE Logo

Malware sandbox for executing malicious files in an isolated environment with advanced features.

0
dfvfs Logo

A digital forensics tool that provides read-only access to file-system objects from various storage media types and file formats.

0
The Pyramid of Pain Logo

A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

0
Enjarify Logo

A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.

0
YARA Rules Collection Logo

Collection of YARA signatures from recent malware research.

0
Lab of a Penetration Tester: Week of Evading Microsoft ATA Logo

A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection

0
Hornet Logo

Medium interaction SSH Honeypot with multiple virtual hosts and sandboxed filesystems.

0
TypeDB Blog Logo

Technical blog posts, announcements, tutorials, and insights on TypeDB & TypeQL.

0
ParrotSec Logo

Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

0
Security Driven .NET Logo

A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.

1
YETI Logo

YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange.

0