158 tools and resources
Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Reach out!
A comprehensive online resource for application security knowledge
A local privilege escalation vulnerability in the Linux kernel known for its catchy name and potential damages.
A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.
The Node.js Bug Bounty Program is a program aimed at identifying and fixing security vulnerabilities in the Node.js ecosystem.
The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.
A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.
A collection of real-world scenarios to evaluate command injection detection and exploitation abilities
WordPress security scanner for identifying vulnerabilities in WordPress websites.
A tool that checks for hijackable packages in NPM and Python Pypi registries
Next-generation Linux exploit suggester with improved features for finding privilege escalation vulnerabilities.
A massive SQL injection vulnerability scanner
CSET is a free software tool for identifying vulnerabilities in enterprise and industrial control cyber systems.
A vulnerable web site in NodeJS for testing security source code analyzers.
Automate Google Hacking Database scraping and searching with Pagodo, a tool for finding vulnerabilities and sensitive information.
A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.
A repository containing hourly-updated data dumps of bug bounty platform scopes
A curated list of known malicious NPM packages
A tool that finds unprotected secrets in container images or file systems, matching against a database of 140 secret types.
Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Nmap is an essential network scanning tool used for network security auditing and status monitoring.