Tools for identifying, prioritizing, and remediating security vulnerabilities in systems and applications.
Explore 166 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Automate Google Hacking Database scraping and searching with Pagodo, a tool for finding vulnerabilities and sensitive information.
A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.
A repository containing hourly-updated data dumps of bug bounty platform scopes
A curated list of known malicious NPM packages
A tool that finds unprotected secrets in container images or file systems, matching against a database of 140 secret types.
Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Nmap is an essential network scanning tool used for network security auditing and status monitoring.
Finds publicly known security vulnerabilities in a website's frontend JavaScript libraries.
Platform for users to test cybersecurity skills by exploiting vulnerabilities.
An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
A Capture The Flag (CTF) platform for testing computer security skills
NoSQLMap is a Python tool for auditing and automating injection attacks on NoSQL databases.
A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.