The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Enigma Logo

A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.

0
Active Directory Security Logo

A comprehensive resource for securing Active Directory, including attack methods and effective defenses.

0
Event Forwarding Guidance Logo

A repository providing guidance on collecting security-relevant Windows event logs using Windows Event Forwarding (WEF).

0
HonnyPotter Logo

A WordPress plugin that logs failed login attempts to help monitor unauthorized access attempts on WordPress websites.

0
ROPgadget Tool Logo

ROPgadget is a cross-platform command-line tool that searches for ROP gadgets in binary files across multiple architectures to facilitate exploit development and ROP chain construction.

0
visualize_logs Logo

A Python library and command line tool that creates interactive visualizations for log data analysis with zoom and navigation capabilities.

0
Netcap Logo

Netcap efficiently converts network packets into structured audit records for machine learning algorithms, using Protocol Buffers for encoding.

0
Dwarf Debugger Logo

A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.

0
Sublime Rules Logo

Open-source rules for detecting and preventing email attacks like BEC, malware, and credential phishing.

0
IPython Notebook Logo

Interactive computational environment for code execution, text, and media combination.

0
AccessData FTK Imager Logo

A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.

0
Medpot Logo

A honeypot tool emulating HL7 / FHIR protocols with various installation and customization options.

0
APT Notes Logo

Repository of APT-related documents and notes sorted by year.

0
Securing Applications in Kubernetes Engine Logo

A tutorial demonstrating how to implement Kubernetes Engine security features to control application privileges through host access controls and network access policies.

0
Schneier on Security Logo

Schneier on Security provides expert analysis and commentary on a wide range of security issues.

0
Modlishka Logo

Modlishka is a reverse proxy tool for intercepting and manipulating HTTP traffic, ideal for penetration testers, security researchers, and developers to analyze and test web applications.

0
shad0w Logo

A post-exploitation framework designed to operate covertly on heavily monitored environments.

0
RegRipper 3.0 Logo

Automated tool for parsing Windows registry hives and extracting valuable information for forensic analysis.

0
dynStruct Logo

dynStruct is a tool for monitoring memory accesses of an ELF binary and recovering structures of the original code.

0
Attack-Defense Online Lab Logo

Hands-on cybersecurity training and testing platform with 1800+ labs

0
Buster Logo

Advanced email reconnaissance tool leveraging public data.

0
vnclowpot Logo

Low-interaction VNC honeypot for logging responses to a static VNC Auth challenge.

0
Passive Network Audit Framework (PNAF) v0.1.2 Logo

Passive Network Audit Framework (PNAF) v0.1.2 provides passive network auditing capabilities and is now a project of COSMIC-Chapter of The Honeynet Project.

0
git-all-secrets Logo

A tool that combines multiple open source Git scanning utilities to detect and list secrets stored in Git repositories for security audits and compliance checks.

0