The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Honeypot for Router Backdoor (TCP-32764) Logo

A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.

0
Blankie Logo

A CSP plugin for hapi with per-route configuration options.

0
Metasploit Framework Logo

A powerful penetration testing platform for identifying vulnerabilities and weaknesses in computer systems.

0
Xss-Sql-Fuzz Logo

A Burp Suite plugin for automatically adding XSS and SQL payload to fuzz

0
Yasuo Logo

A Ruby script that scans networks for vulnerable third-party web applications and front-ends with known exploitable security flaws.

0
FireHOL IP Aggregator Logo

Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.

0
shellfirm Logo

shellfirm will prompt challenges to verify risky shell commands, acting as a captcha for your terminal.

0
go-yara Logo

Go bindings for YARA with installation and build instructions.

0
readpe Logo

A command-line tool for analyzing and extracting detailed information from Windows Portable Executable (PE) files.

0
Breaking and Pwning Apps and Servers on AWS and Azure Logo

A training program that teaches security professionals how to conduct penetration testing and attack simulations against AWS and Azure cloud infrastructure.

0
bap Logo

bap is a webservice honeypot that logs HTTP basic authentication credentials.

0
Metabadger Logo

Metabadger automates the upgrade of AWS EC2 instances to use the more secure Instance Metadata Service v2 (IMDSv2) to prevent SSRF attacks and reduce attack surface.

0
Ryan Stillions: The DML model Logo

A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.

0
Bifrozt-ansible Logo

An Ansible role that automates the deployment and management of Bifrozt honeypots for network security monitoring.

0
Threat Bus Logo

A threat intelligence dissemination layer for open-source security tools with STIX-2 support and plugin-based architecture.

0
Go SSH Honeypot Logo

Fake SSH server that sends push notifications for login attempts

0
MicroBurst Logo

A PowerShell toolkit for penetration testing Microsoft Azure environments, providing discovery, configuration auditing, and post-exploitation capabilities.

0
Volatility 3 Logo

A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.

0
Azure Guardrails Logo

A tool that generates Terraform files for creating Azure Policy Initiatives to implement cloud security guardrails and enforce organizational standards at scale.

0
YouTube Logo

A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.

0
CTF Write-ups Repository (2016) Logo

A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.

0
PSHunt Logo

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

0
w3af Logo

w3af is an open source web application security scanner that identifies over 200 types of vulnerabilities including XSS, SQL injection, and OS commanding in web applications.

0
protobuf-inspector Logo

A command-line tool that parses Google Protobuf encoded data without schema definitions and displays the content in a readable, colored format.

0