Free Cybersecurity Tools
Find the right solution for your security needs without any cost.
Explore 2615 curated tools and resources
LATEST ADDITIONS
Enables code injection into Mac OS X processes with detailed version history and contributing guidelines.
Security-Guard helps secure microservices and serverless containers by detecting and blocking exploits.
A shell script for basic forensic collection of various artefacts from UNIX systems.
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
A custom activity repository for Ayehu NG automation platform, allowing users to create and modify activities to fit their specific needs.
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
A Rust-based command-line tool for analyzing .apk files to detect vulnerabilities.
Script to verify audit settings for Microsoft Defender for Endpoint in GPO.
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
CTFd is a Capture The Flag framework with extensive features for creating and managing CTF competitions.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.