Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.
Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.
Repository of YARA rules for Trellix ATR blogposts and investigations
Repository of YARA rules for Trellix ATR blogposts and investigations
Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.
Cybrary is an online learning platform that provides accessible and affordable training in cybersecurity skills.
A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.
A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
OSXCollector is a forensic evidence collection & analysis toolkit for OSX.
OSXCollector is a forensic evidence collection & analysis toolkit for OSX.
Mass IP port scanner for Internet-scale scanning with high speed and flexibility.
Mass IP port scanner for Internet-scale scanning with high speed and flexibility.
A command-line tool for managing and analyzing Microsoft Forefront TMG and UAG configurations.
A command-line tool for managing and analyzing Microsoft Forefront TMG and UAG configurations.
CloudTracker helps identify over-privileged IAM users and roles by analyzing CloudTrail logs.
CloudTracker helps identify over-privileged IAM users and roles by analyzing CloudTrail logs.
Incident Response Documentation tool for tracking findings and tasks.
Incident Response Documentation tool for tracking findings and tasks.
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
Automate version scraping and vulnerability scanning for Ruby on Rails stacks.
Automate version scraping and vulnerability scanning for Ruby on Rails stacks.
Detailed analysis of the event-stream incident and actions taken by npm Security.
Detailed analysis of the event-stream incident and actions taken by npm Security.
A simple ransomware protection that intercepts and kills malicious processes attempting to delete shadow copies using vssadmin.exe.
A simple ransomware protection that intercepts and kills malicious processes attempting to delete shadow copies using vssadmin.exe.
Browse and analyze iPhone/iPad backups with detailed file properties and various viewers.
Browse and analyze iPhone/iPad backups with detailed file properties and various viewers.
Detect signed malware and track stolen code-signing certificates using osquery.
Detect signed malware and track stolen code-signing certificates using osquery.
Open source web app for storing and searching Actor related data from users and public repositories.
Open source web app for storing and searching Actor related data from users and public repositories.
Revelo is an experimental Javascript deobfuscator tool with features to analyze and deobfuscate Javascript code.
Revelo is an experimental Javascript deobfuscator tool with features to analyze and deobfuscate Javascript code.
A Serverless Security Orchestration Automation and Response (SOAR) Framework for AWS GuardDuty with various supported actions.
A Serverless Security Orchestration Automation and Response (SOAR) Framework for AWS GuardDuty with various supported actions.
An intentionally insecure Android app designed to teach developers and security professionals about common app vulnerabilities.
An intentionally insecure Android app designed to teach developers and security professionals about common app vulnerabilities.
A unified repository for different Metasploit Framework payloads.
A unified repository for different Metasploit Framework payloads.
Guidance on securing NFS in Red Hat Enterprise Linux 7
Guidance on securing NFS in Red Hat Enterprise Linux 7