Tools for identifying, assessing, and mitigating cyber threats across organizations.
Explore 239 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.
ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring.
GCTI's open-source detection signatures for malware and threat detection
OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.
An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.
A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.
A collection of YARA rules for research and hunting purposes.
A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.
Scan files or process memory for Cobalt Strike beacons and parse their configuration.
RedEye is a visual analytic tool for enhancing Red and Blue Team operations.
A cybersecurity tool with online demo, mailing list, and multiple installation methods.
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
Tool for visualizing correspondences between YARA ruleset and samples
A library of Amazon S3 attack scenarios with mitigation strategies.