The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

mhn-core-docker Logo

A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.

0
Intelligent HoneyNet Dashboard Logo

A comprehensive dashboard for managing and monitoring honeypots with detailed information on attack attempts and connections.

0
PowerUp Logo

PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.

0
Lambda-Proxy Logo

Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.

0
Tracecat Logo

Open-source security automation platform for automating security alerts and building AI-assisted workflows.

0
tcptraceroute Logo

A TCP-based traceroute implementation that bypasses firewall filters to trace the path to a destination.

0
CimSweep Logo

CimSweep is a suite of CIM/WMI-based tools for incident response and hunting operations on Windows systems without the need to deploy an agent.

0
The DFIR Report Logo

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

0
nightHawk Response Logo

Custom built application for asynchronous forensic data presentation on an Elasticsearch backend, with upcoming features like Docker-based installation and new UI rewrite in React.

0
Network Access Analyzer Logo

Network Access Analyzer is an AWS VPC feature that identifies unintended network access to cloud resources by analyzing internet gateways, route tables, ACLs, and security groups.

0
Zeek Agent Logo

An endpoint monitoring tool for Linux and macOS that reports file, socket, and process events to Zeek.

0
CTF Write-ups Repository (2014) Logo

A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.

0
Morphisec Breach Prevention Platform Logo

Endpoint security platform using Moving Target Defense to prevent cyber attacks and provide adaptive exposure management and threat prevention.

0
Threatelligence v0.1 Logo

A tool for fetching and visualizing cyber threat intelligence data with Elasticsearch and Kibana integration.

0
Yaraprocessor Logo

Yaraprocessor allows for scanning data streams in unique ways and dynamic scanning of payloads from network packet captures.

0
Cloud Inquisitor Logo

Cloud Inquisitor is an AWS security tool that monitors resource ownership, detects domain hijacking, verifies security services, and manages IAM policies across multiple accounts.

0
sqlmap Logo

Automates SQL injection detection and exploitation

0
aws-fast-fixes Logo

A collection of automation scripts that quickly enable essential AWS security and compliance features that are not activated by default in AWS accounts.

0
Pwndrop Logo

Pwndrop is a self-deployable file hosting service for red teamers, allowing easy upload and sharing of payloads over HTTP and WebDAV.

0
Android-Security-Reference Logo

A comprehensive guide to Android Security

0
Damn Vulnerable iOS App (DVIA) Logo

iOS application for testing iOS penetration testing skills in a legal environment.

0
tcpkill Logo

A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.

0
Chainsaw Logo

Powerful tool for searching and hunting through Windows forensic artefacts with support for Sigma detection rules and custom Chainsaw detection rules.

0