Explore 2750 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
A command-line utility and Python package for mounting and unmounting various disk image formats with support for different volume systems and filesystems.
Social news aggregation and discussion platform for cybersecurity professionals.
Comprehensive reference guide for bug bounty hunters with detailed information on various vulnerabilities, platforms, tools, and best practices.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
Analyze suspicious files, domains, IPs, and URLs to detect malware and other breaches, and share results with the security community.
OpenRASP directly integrates its protection engine into the application server by instrumentation, providing context-aware protection and detailed stack trace logging.
Lists of sources and utilities to hunt, detect, and prevent evildoers.
A tool designed to extract additional value from enterprise-wide AppCompat / AmCache data
A tool to verify the integrity of PNG, JNG, and MNG files and extract detailed information about the image.
Yabin creates Yara signatures from malware to find similar samples.
Cutting-edge technology for developing security applications within the Linux kernel.
Interactive online malware sandbox for real-time analysis and threat intelligence
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.