Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
A cross-platform software library for interacting with iOS devices without jailbreaking.
A cross-platform software library for interacting with iOS devices without jailbreaking.
Collects and organizes Linux OS data for detailed analysis and incident response.
Collects and organizes Linux OS data for detailed analysis and incident response.
Tool for visualizing and analyzing control paths in Active Directory to determine access privileges and permissions.
Tool for visualizing and analyzing control paths in Active Directory to determine access privileges and permissions.
JARM is a TLS server fingerprinting tool used for identifying server configurations and malicious infrastructure.
JARM is a TLS server fingerprinting tool used for identifying server configurations and malicious infrastructure.
Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
Explore cybersecurity insights and tips on McAfee Blogs to stay safe online.
Explore cybersecurity insights and tips on McAfee Blogs to stay safe online.
AI-Powered Cloud Assistant for building, securing, and operating cloud environments.
AI-Powered Cloud Assistant for building, securing, and operating cloud environments.
A next generation version of enum4linux with enhanced features for enumerating information from Windows and Samba systems.
A next generation version of enum4linux with enhanced features for enumerating information from Windows and Samba systems.
A Graphical Realism Framework for Industrial Control Simulation organized as 5 VirtualBox VMs for realistic ICS network simulation.
A Graphical Realism Framework for Industrial Control Simulation organized as 5 VirtualBox VMs for realistic ICS network simulation.
A tool for creating compact Linux memory dumps compatible with popular debugging tools.
A tool for creating compact Linux memory dumps compatible with popular debugging tools.
Automated vulnerability discovery tool for Cake PHP framework with limited false positives.
Automated vulnerability discovery tool for Cake PHP framework with limited false positives.
A detailed SSH cheat sheet for managing SSH connections and troubleshooting common issues.
A detailed SSH cheat sheet for managing SSH connections and troubleshooting common issues.
Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.
Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.
Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.
Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.
Enhances Windows OS security through system modifications and settings adjustments.
Enhances Windows OS security through system modifications and settings adjustments.
A database of Tor exit nodes with their corresponding IP addresses and timestamps.
A database of Tor exit nodes with their corresponding IP addresses and timestamps.
A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.
A low interaction Python honeypot designed to mimic various services and ports to attract attackers and log access attempts.
Guidelines and best practices for securely storing passwords.
Guidelines and best practices for securely storing passwords.
OpenCanary is a multi-protocol network honeypot with low resource requirements and alerting capabilities.
OpenCanary is a multi-protocol network honeypot with low resource requirements and alerting capabilities.
A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.
A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.
All-in-one vulnerability intelligence platform for prioritizing remediation efforts and driving security strategies.
All-in-one vulnerability intelligence platform for prioritizing remediation efforts and driving security strategies.
Elasticsearch is a versatile platform for centralized data storage, fast search, and scalable analytics.
Elasticsearch is a versatile platform for centralized data storage, fast search, and scalable analytics.
Cloudmarker is a cloud monitoring tool and framework that audits Azure and GCP cloud environments.
Cloudmarker is a cloud monitoring tool and framework that audits Azure and GCP cloud environments.
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.