Free Cybersecurity Tools
Find the right solution for your security needs without any cost.
Explore 2615 curated tools and resources
LATEST ADDITIONS
PHP Script demonstrating a smart honey pot for email form protection.
A network-based panic button to overwrite LUKS header and shutdown the computer in emergencies, making data recovery impossible.
Automatically curate open-source Yara rules and run scans with YAYA.
NoSQLMap is a Python tool for auditing and automating injection attacks on NoSQL databases.
A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
A collection of APT and cybercriminals campaigns with various resources and references.
Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.
RABCDAsm is a collection of utilities for ActionScript 3 assembly/disassembly and SWF file manipulation.
A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.
A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts
iOS Mobile Backup Xtractor tool for extracting iOS backups.
Generates randomized C2 profiles for Cobalt Strike to evade detection.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.