Free Cybersecurity Tools
Find the right solution for your security needs without any cost.
Explore 2615 curated tools and resources
LATEST ADDITIONS
Vim syntax-highlighting plugin for YARA rules with support up to v4.3.
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
Detect off-instance key usage in AWS by analyzing CloudTrail files locally.
A honeypot trap for Symfony2 forms to reduce spam submissions.
Hoarder is a tool to collect and parse windows artifacts.
A tool for injecting and loading executables with a focus on stealth techniques.
A set of instructions for the Dalvik virtual machine to manipulate registers and values in Android applications.
A Burp extension to check JWT tokens for potential weaknesses
Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.
Blue-team capture the flag competition for improving cybersecurity skills.
A powerful tool for extracting passwords and performing various Windows security operations.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.