Comprehensive solutions for securing network infrastructure, traffic, and communications.
Explore 246 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A honeypot designed to detect and analyze malicious activities in instant messaging platforms.
Tor Browser is a free and open-source software that allows users to browse the internet anonymously and privately.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
Azure DDoS Protection and Mitigation Services by Microsoft Azure for secure cloud solutions.
Makes output from the tcpdump program easier to read and parse.
A network protocol analyzer for capturing and analyzing network traffic with a focus on TCP/IP flow reconstruction and response time tracking.
A library for integrating communication channels with the Cobalt Strike External C2 server.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
Fail2ban is a daemon that scans log files and bans IPs showing malicious signs to protect servers from brute-force attacks.
LinkLiar is a status menu app for spoofing MAC addresses to enhance privacy on MacBook.
A set of Go-based emulators for testing network security and analyzing network traffic.
An HTTP proxy, monitor, and reverse proxy tool for viewing HTTP and SSL/HTTPS traffic.
A network protocol panic button operating decentralized through UDP broadcasts and HTTP, intended for sensitive networks to prevent cold boot attacks.