The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

RABCDAsm Logo

RABCDAsm is a collection of utilities for ActionScript 3 assembly/disassembly and SWF file manipulation.

0
Penetration Testing Execution Standard (PTES) Logo

A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.

0
DCEPT Logo

A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts

0
imobax Logo

A command-line tool for extracting data from iOS mobile device backups created by iTunes on macOS systems.

0
C2concealer Logo

A command line tool that generates randomized malleable C2 profiles for Cobalt Strike to vary command and control communication patterns.

0
OWASP Mobile Application Security Testing Guide (MASTG) Logo

Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.

0
timeliner Logo

Timeliner is a digital forensics tool that rewrites mactime with an advanced expression engine for complex timeline filtering using BPF syntax.

0
kube-forensics Logo

Create checkpoint snapshots of the state of running pods for later off-line analysis.

0
DFIRTrack Logo

DFIRTrack is an open source web application focused on incident response for handling major incidents with many affected systems, tracking system status, tasks, and artifacts.

0
N-Stalker Logo

A web security tool that scans for vulnerabilities and known attacks.

0
WordPress Exploit Framework Logo

A Ruby framework designed to aid in the penetration testing of WordPress systems.

0
jpeginfo Logo

A command-line tool that extracts detailed technical information, metadata, and checksums from JPEG image files with support for multiple output formats.

0
CrowdStrike Falcon Orchestrator Logo

A Windows-based workflow automation and case management application that integrates with CrowdStrike Falcon APIs to streamline security operations and incident response processes.

0
Breach Report Collection Logo

A curated collection of companies that have publicly disclosed adversary tactics, techniques, and procedures following security breaches.

0
SRA TAXII2 Server Logo

Taxii2 server for interacting with taxii services.

0
VolUtility Logo

Web interface for the Volatility Memory Analysis framework with advanced features.

0
Strelka Logo

Strelka is a real-time, container-based file scanning system that performs file extraction and metadata collection at enterprise scale for threat hunting, detection, and incident response.

0
Kiterunner Logo

Kiterunner is a tool for lightning-fast traditional content discovery and bruteforcing API endpoints in modern applications.

0
node-ftp-honeypot Logo

A FTP honeypot tool for detecting and capturing malicious file upload attempts.

0
Vim Syntax Highlighting for YARA Rules Logo

A Vim syntax-highlighting plugin for YARA rules that supports versions up to v4.3 and provides enhanced code readability for malware analysts.

0
Pig Logo

Linux packet crafting tool for testing IDS/IPS and creating attack signatures.

0
Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives Logo

A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

0
Jupyter Notebooks for Threat Hunting Logo

Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.

0
AWS Key Usage Detector Logo

A command-line tool that analyzes local CloudTrail files to detect off-instance AWS key usage patterns for security monitoring and forensic analysis.

0