239 tools and resources
Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Reach out!
A tool for discovering and enumerating external attack surfaces
Load-balancing solution by Microsoft Azure with global infrastructure and financial guidance.
SSHGuard protects hosts from brute-force attacks by monitoring system logs, detecting attacks, and blocking attackers using a firewall.
A repository of pre-defined detections for security threats and abnormal behaviors in Falco.
Django based web application for network traffic analysis with protocol handling capabilities.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
A module for loading Bro logs as tables in Osquery
A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic
Express middleware for detecting and redirecting Tor or Surface users.
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.
A collection of PCAPs for ICS/SCADA utilities and protocols with the option for users to contribute.
A tool for analyzing TCP packet traces with color support.
pfSense is a leading open source firewall and network security solution, providing advanced protection and connectivity options.
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
Open source software for leveraging insights from flow and packet analysis to identify potential security threats or attacks.
A utility for splitting packet traces along TCP connection boundaries.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.
Firewall, Blackhole, and Privatizing Proxy for macOS with comprehensive security features.