The Largest Platform to Find Cybersecurity Tools

Explore 3124 curated cybersecurity tools, with 15,627 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

LogSlash Logo

A method for log volume reduction without losing analytical capability.

0
bWAPP Logo

A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.

0
Smogcloud Logo

A Go-based tool for discovering and inventorying internet-facing AWS assets across single or multiple accounts to help maintain comprehensive cloud attack surface visibility.

0
yunginnanet HellPot Logo

Cross-platform HTTP honeypot that traps bots with infinite data streams

0
mbtget Logo

Simple perl script for making Modbus transactions from the command line.

0
The Practice of Network Security Monitoring Logo

A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.

0
AfterGlow Logo

Visualize and analyze network relationships with AfterGlow

0
Penetration Testing Practice Lab - Vulnerable Apps/Systems Logo

Collection of URLs for vulnerable web applications and systems for cybersecurity practice.

0
Hayabusa Logo

Windows event log fast forensics timeline generator and threat hunting tool.

0
SharpShooter Logo

A payload creation framework for generating and executing C# code payloads with anti-evasion capabilities for offensive security operations.

0
vim-yara Logo

Syntax, indent, and filetype detection for YARA rule files with auto-indenting and error display in quickfix window.

0
DataCop Logo

DataCop is an AWS framework that automatically blocks S3 buckets containing PII or classified information based on AWS Macie findings and configurable security policies.

0
ModSecurity Logo

ModSecurity is an open-source web application firewall that provides a flexible and scalable way to monitor and control HTTP traffic.

0
LockUp Logo

An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.

0
Pasithea Logo

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

0
Event Log Explorer Logo

Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.

0
Veles Logo

A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.

0
DailyIOC Logo

A daily collection of IOCs from various sources, including articles and tweets.

0
Otseca Logo

Open source security auditing tool to search and dump system configuration.

0
Hadoop PCAP library Logo

A Hadoop library for reading and querying PCAP files

0
Malware Indicators of Compromise Logo

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

0
WeirdAAL (AWS Attack Library) Logo

WeirdAAL is an open-source framework that provides tools and libraries for simulating attacks and testing security vulnerabilities in AWS environments.

0
6Guard (IPv6 attack detector) Logo

6Guard is an IPv6 attack detector sponsored by Google Summer of Code 2012 and supported by The Honeynet Project organization.

0