Explore 2989 curated tools and resources
Get weekly cybersecurity updates, straight in your inbox.
Want your tool featured here?
Get maximum visibility with pinned placement
Repository of Yara signatures for detecting targeted attacks on civil society organizations
Repository of Yara signatures for detecting targeted attacks on civil society organizations
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.
Repository of default playbooks and custom functions for Splunk SOAR instances with content migration to Splunk's GitHub.
Repository of default playbooks and custom functions for Splunk SOAR instances with content migration to Splunk's GitHub.
An open source, self-hosted implementation of the Tailscale control server.
An open source, self-hosted implementation of the Tailscale control server.
Cloud Security Dashboard with AWS CIS Security Benchmarks and JIRA integration.
Cloud Security Dashboard with AWS CIS Security Benchmarks and JIRA integration.
A library of PHP unserialize() payloads and a tool to generate them.
Modern digital forensics and incident response platform with comprehensive tools.
Modern digital forensics and incident response platform with comprehensive tools.
Scans Alpine base images for vulnerabilities using Multi Stage builds in Docker 17.05
Scans Alpine base images for vulnerabilities using Multi Stage builds in Docker 17.05
A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.
A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.
Scoring server for Cyber Capture the Flag events with a focus on problem modification and hint offerings.
Scoring server for Cyber Capture the Flag events with a focus on problem modification and hint offerings.
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
Free multi-platform database tool with support for various databases and rich features.
Free multi-platform database tool with support for various databases and rich features.
A comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications.
A comprehensive reference guide to Nmap's scripting engine and its various options, scripts, and target specifications.
BunkerWeb is a next-generation and open-source Web Application Firewall (WAF) with seamless integration and user-friendly customization options.
BunkerWeb is a next-generation and open-source Web Application Firewall (WAF) with seamless integration and user-friendly customization options.
A powerful interactive packet manipulation program and library for network exploration and security testing.
A powerful interactive packet manipulation program and library for network exploration and security testing.
CHIPSEC is a framework for analyzing the security of PC platforms and components, with tools for low-level interfaces and forensic capabilities.
CHIPSEC is a framework for analyzing the security of PC platforms and components, with tools for low-level interfaces and forensic capabilities.
A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.
A tool for deep analysis of malicious files using ClamAV and YARA rules, with features like scoring suspect files, building visual tree graphs, and extracting specific patterns.
ConDroid performs concolic execution of Android apps to observe 'interesting' behavior in dynamic analysis.
ConDroid performs concolic execution of Android apps to observe 'interesting' behavior in dynamic analysis.
A simple Golang application for storing NIST National Software Reference Library Reference Data Set (NSRL RDS) with md5 and sha1 hash lookup searches.
A simple Golang application for storing NIST National Software Reference Library Reference Data Set (NSRL RDS) with md5 and sha1 hash lookup searches.
A collection of reports and resources highlighting Android security vulnerabilities and best practices.
A collection of reports and resources highlighting Android security vulnerabilities and best practices.
TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.
TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.
Open Source Threat Intelligence Gathering and Processing Framework