The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

EoHoneypotBundle Logo

A honeypot trap for Symfony2 forms to reduce spam submissions.

0
Hoarder Logo

Hoarder is a tool to collect and parse windows artifacts.

0
Saruman v0.1 Logo

A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.

0
Dalvik Opcodes Logo

A set of instructions for the Dalvik virtual machine to manipulate registers and values in Android applications.

0
jwt-heartbreaker Logo

A Burp extension to check JWT tokens for potential weaknesses

0
The Security Ledger Logo

Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.

0
KFSensor Logo

KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.

0
Splunk Boss of the SOC Logo

Blue-team capture the flag competition for improving cybersecurity skills.

0
mimikatz Logo

A powerful tool for extracting passwords and performing various Windows security operations.

0
a-ray-grass Logo

YARA module for supporting DCSO format bloom filters with hashlookup capabilities.

0
Kojoney Logo

A honeypot for the SSH Service

0
LiME Logo

LiME is a Linux Memory Extractor tool for acquiring volatile memory from Linux and Linux-based devices, including Android, with features like full memory captures and minimal process footprint.

0
Glastopf Logo

Python web application honeypot with vulnerability type emulation and modular design.

0
Movfuscator-Be-Gone Logo

A de-obfuscator for M/o/Vfuscator, a notorious obfuscator, designed to reverse the effects of M/o/Vfuscator's obfuscation.

1
Yara Python ICAP Server Logo

ICAP Server with Yara scanner for URL and content.

0
Explorer Suite Logo

A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

0
Java-Deserialization-Cheat-Sheet Logo

A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries.

0
The Hacker News Logo

The Hacker News is a leading cybersecurity news platform providing updates, insights, and information to professionals and enthusiasts in the field.

0
autoruns Logo

A comprehensive utility that shows what programs are configured to run during system bootup or login, and when you start various built-in Windows applications.

0
RITA (Real Intelligence Threat Analytics) Logo

Open source framework for network traffic analysis with advanced features.

0
AWS Key Management Service Logo

A cloud-based key management service for encrypting and digitally signing data.

0
Naked Security and Sophos News Logo

Naked Security by Sophos offers expert insights and practical advice on cybersecurity threats and protection strategies.

0
Procmon for Linux Logo

Procmon for Linux is a reimagining of the classic Procmon tool from Windows, allowing Linux developers to trace syscall activity efficiently.

0
Mana Security Logo

Mana Security is a macOS-focused vulnerability management tool that continuously monitors 100+ applications for security vulnerabilities and tracks patching performance against community benchmarks.

0