The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Bifrozt Logo

High interaction honeypot solution for Linux systems with data control and integrity features.

0
ARM TrustZone Logo

ARM TrustZone provides a secure execution environment for applications on ARM processors.

0
Confused Logo

A dependency security scanner that identifies potential supply chain vulnerabilities by checking for available package namespace registrations across Python, JavaScript, PHP, and Maven repositories.

0
Practical Memory Forensics Logo

A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.

0
SILENTTRINITY Logo

SILENTTRINITY is a Python-based, asynchronous C2 framework that uses .NET scripting languages for post-exploitation activities without relying on PowerShell.

0
Sysdig Logo

Sysdig is a universal system visibility tool that provides deep monitoring and analysis capabilities for traditional systems and containerized environments through system call tracing and network activity monitoring.

0
Kippo Logo

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.

0
findmytakeover Logo

A multi-cloud DNS security tool that detects dangling DNS records and potential subdomain takeover vulnerabilities by scanning cloud infrastructure and DNS zones.

0
gau Logo

A command-line tool that fetches known URLs from various sources to identify potential security threats and vulnerabilities.

0
Palantir osquery Configuration Logo

Companion repository for deploying osquery in a production environment with tailored query packs.

0
CyLR Logo

CyLR is a Live Response Collection tool for quickly and securely collecting forensic artifacts from hosts with NTFS file systems.

0
Substation Logo

A cloud-native, event-driven data pipeline toolkit for security teams that processes and routes data across AWS services with custom formatting and API enrichment capabilities.

0
Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection Logo

A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions

0
Universal Book Links Logo

Find books at your favorite store and stay updated on new features with Universal Book Links.

0
PhoneyC Logo

PhoneyC is a client-side honeypot that emulates vulnerable web browsers to detect and analyze malicious web content and browser-based exploits.

0
PacketQ Logo

A command-line tool that allows SQL queries to be executed directly on PCAP files for network traffic analysis with support for multiple output formats.

0
GoatseLinux: It's Wide Open [tm] GSL Logo

A VMware image for penetration testing purposes

0
Microsoft Sentinel Ninja Training Logo

Level 400 training to become a Microsoft Sentinel Ninja.

0
Enjarify by Google Logo

A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.

0
Androguard Logo

A full python tool for analyzing Android files with various functionalities.

0
LogSlash Logo

A method for log volume reduction without losing analytical capability.

0
bWAPP Logo

A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.

0
Smogcloud Logo

A Go-based tool for discovering and inventorying internet-facing AWS assets across single or multiple accounts to help maintain comprehensive cloud attack surface visibility.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →