The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

yunginnanet HellPot Logo

Cross-platform HTTP honeypot that traps bots with infinite data streams

0
mbtget Logo

Simple perl script for making Modbus transactions from the command line.

0
The Practice of Network Security Monitoring Logo

A comprehensive guide to network security monitoring, teaching readers how to detect and respond to intrusions using open source software and vendor-neutral tools.

0
AfterGlow Logo

Visualize and analyze network relationships with AfterGlow

0
Penetration Testing Practice Lab - Vulnerable Apps/Systems Logo

Collection of URLs for vulnerable web applications and systems for cybersecurity practice.

0
Hayabusa Logo

Windows event log fast forensics timeline generator and threat hunting tool.

0
SharpShooter Logo

A payload creation framework for generating and executing C# code payloads with anti-evasion capabilities for offensive security operations.

0
vim-yara Logo

Syntax, indent, and filetype detection for YARA rule files with auto-indenting and error display in quickfix window.

0
DataCop Logo

DataCop is an AWS framework that automatically blocks S3 buckets containing PII or classified information based on AWS Macie findings and configurable security policies.

0
ModSecurity Logo

ModSecurity is an open-source web application firewall that provides a flexible and scalable way to monitor and control HTTP traffic.

0
LockUp Logo

An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.

0
Pasithea Logo

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

0
Event Log Explorer Logo

Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.

0
Veles Logo

A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.

0
DailyIOC Logo

A daily collection of IOCs from various sources, including articles and tweets.

0
Otseca Logo

Open source security auditing tool to search and dump system configuration.

0
Hadoop PCAP library Logo

A Hadoop library for reading and querying PCAP files

0
Malware Indicators of Compromise Logo

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

0
WeirdAAL (AWS Attack Library) Logo

WeirdAAL is an open-source framework that provides tools and libraries for simulating attacks and testing security vulnerabilities in AWS environments.

0
6Guard (IPv6 attack detector) Logo

6Guard is an IPv6 attack detector sponsored by Google Summer of Code 2012 and supported by The Honeynet Project organization.

0
Mastiff Logo

A static analysis framework for extracting key characteristics from various file formats

0
Altoro Mutual Online Banking Logo

Altoro Mutual offers online banking, real estate financing, business credit cards, retirement solutions, and prioritizes privacy and security.

0
Honeyntp Logo

Honeyntp is an NTP honeypot and logging tool that captures NTP packets into a Redis database to detect DDoS attacks and monitor network time protocol traffic.

0