The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Hacksplaining Logo

Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.

1
Google CTF Logo

A Capture The Flag (CTF) platform for testing computer security skills

0
Covenant Logo

Covenant is a collaborative .NET command and control framework designed for red team operations and offensive security engagements.

0
Deception-as-Detection Logo

Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.

0
evtkit Logo

A tool for fixing acquired .evt Windows Event Log files in digital forensics.

0
Rapid7 Labs Repository Logo

A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.

0
MalShare Logo

Platform for uploading, searching, and downloading malware samples.

0
Signature-Base Logo

YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.

0
Fenrir Simple Bash IOC Scanner Logo

A lightweight bash script IOC scanner for Linux/Unix/macOS systems that detects malicious indicators through hash matching, filename analysis, string searches, and C2 server identification without requiring installation.

0
Kippo Stats Logo

A webapp for displaying statistics about your kippo SSH honeypot.

0
AWS Security Hub Logo

Automate AWS security checks and centralize security alerts.

0
Yara File Checker Logo

A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.

0
yaramod Logo

Yaramod is a library for parsing YARA rules into AST and building new YARA rulesets with C++ programming interface.

0
DistroWatch.com Logo

A website for information on Linux and BSD distributions.

0
Meerkat Logo

A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.

0
smart-honeypot PHP Script Logo

PHP Script demonstrating a smart honey pot for email form protection.

0
Nuke My LUKS Logo

A network-triggered emergency tool that overwrites LUKS encryption headers with random data to prevent forced decryption in high-risk situations.

0
YAYA - Yet Another Yara Automaton Logo

Automatically curate open-source Yara rules and run scans with YAYA.

0
NoSQLMap Logo

NoSQLMap is an open source Python tool that automates NoSQL injection attacks and exploits configuration weaknesses in NoSQL databases to disclose or clone data.

0
Reversing and Exploiting ARM Binaries: rwthCTF Trafman Logo

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

0
APT & Cybercriminals Campaign Collection Logo

A collection of APT and cybercriminals campaigns with various resources and references.

0
nfspy Logo

ID-spoofing NFS client

0
Hardwear.io Conference 2018 Logo

Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.

0