Collection of specialized cybersecurity tools in OT, ICS, IoT, Mobiel and other specialized areas.Explore 166 curated tools and resources
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
This tutorial describes how to set up two-factor authentication for an SSH server by integrating Google Authenticator with OpenSSH.
This tutorial describes how to set up two-factor authentication for an SSH server by integrating Google Authenticator with OpenSSH.
A lab designed for defenders to quickly build a Windows domain pre-loaded with security tooling and best practices in system logging configurations.
A lab designed for defenders to quickly build a Windows domain pre-loaded with security tooling and best practices in system logging configurations.
A CTF platform inspired by motherfuckingwebsite.com, emphasizing simplicity and lightweight features.
A CTF platform inspired by motherfuckingwebsite.com, emphasizing simplicity and lightweight features.
A CLI tool for signing and verifying npm and yarn packages.
A super-simple, modern framework for organizing and automating cybersecurity tasks.
A super-simple, modern framework for organizing and automating cybersecurity tasks.
Certificate Transparency Monitor that alerts you when an SSL/TLS certificate is issued for your domains.
Certificate Transparency Monitor that alerts you when an SSL/TLS certificate is issued for your domains.
A tool for SSH server auditing with comprehensive analysis capabilities.
A tool for SSH server auditing with comprehensive analysis capabilities.
Domain registration and web hosting services with free features and 24/7 customer support
Domain registration and web hosting services with free features and 24/7 customer support
3GL is a high-level programming language with a focus on ASM for 6502.
Non-profit organization supporting the advancement of open source software.
Non-profit organization supporting the advancement of open source software.
A tool to secure your shell commands history by clearing sensitive commands
A tool to secure your shell commands history by clearing sensitive commands
Mellivora Mellivora is a PHP-based CTF engine with a wide range of features for managing Capture The Flag competitions.
Mellivora Mellivora is a PHP-based CTF engine with a wide range of features for managing Capture The Flag competitions.
A portable Docker container with preinstalled AWS security tools for SecOps on AWS.
A portable Docker container with preinstalled AWS security tools for SecOps on AWS.
Docker file for building Androguard dependencies with an optional interactive shell environment.
Docker file for building Androguard dependencies with an optional interactive shell environment.