The Largest Platform to Find Cybersecurity Tools

Explore 3178 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

RECENTLY ADDED

Hacker101 Logo

Free online class for web security and hacking

0
Infosec Boot Camps Logo

Live and on-demand cybersecurity training programs for all levels.

1
Blackhat Conference Presentation Slides Logo

A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.

0
Kali Logo

Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

0
ClassyShark Logo

A standalone binary inspection tool for Android developers with support for various formats and dependencies.

0
libfvde Logo

A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.

0
Keyscope Logo

A key and secret validation workflow tool built in Rust, supporting over 30 providers and exporting to JSON or CSV.

0
Whispers Logo

A static code analysis tool for parsing common data formats to detect hardcoded credentials and dangerous functions.

0
Bad Sector Labs Blog - Last Week in Security (LWiS) Logo

Weekly summary of cybersecurity news and exploits.

0
CFGScanDroid Logo

CFGScanDroid is a Java utility that compares control flow graph signatures to Android method control flow graphs for malicious application detection.

0
BeyondTrust Privileged Access Management (PAM) Logo

BeyondTrust Privileged Access Management (PAM) provides comprehensive security controls for privileged accounts and users.

0
Matano Open Source Security Data Lake Logo

An open source cloud-native security data lake platform for AWS that normalizes security logs into structured data with Detection-as-Code capabilities and vendor-neutral storage using open standards.

0
CLR Anti-Debugger/Profiler Code Logo

Code to prevent a managed .NET debugger/profiler from working.

0
LOKI Logo

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

0
TikiTorch Logo

TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.

0
libtaxii Logo

A Python library for handling TAXII v1.x messages and services to enable automated threat intelligence sharing and indicator exchange.

0
AttackerKB Logo

A platform providing an activity feed on exploited vulnerabilities.

0
IDA_scripts Logo

A collection of Python scripts that automate tasks and extend IDA Pro disassembler functionality for reverse engineering workflows.

0
HpfeedsHoneyGraph Logo

HpfeedsHoneyGraph is a visualization application that creates graphical representations of hpfeeds logs to aid cybersecurity analysis of honeypot data.

0
tcpdump Logo

Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.

0
Malheur Logo

Automatic analysis of malware behavior using machine learning.

0
UPX Logo

UPX is a high-performance executable packer for various executable formats.

0
FingerprintJS Android Logo

A lightweight library for device identification and fingerprinting, written in Kotlin and 100% crash-free.

0
Malware Signatures Overview Logo

A collection of Yara signatures developed by Citizen Lab to detect malware used in targeted attacks against civil society organizations.

0