Find the right solution for your security needs without any cost.Explore 2627 curated tools and resources
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Enables code injection into Mac OS X processes with detailed version history and contributing guidelines.
Enables code injection into Mac OS X processes with detailed version history and contributing guidelines.
Security-Guard helps secure microservices and serverless containers by detecting and blocking exploits.
Security-Guard helps secure microservices and serverless containers by detecting and blocking exploits.
RedELK enhances Red Team operations with SIEM capabilities to monitor and alert on Blue Team activities.
A shell script for basic forensic collection of various artefacts from UNIX systems.
A shell script for basic forensic collection of various artefacts from UNIX systems.
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
Tool for managing Yara rules on VirusTotal
A custom activity repository for Ayehu NG automation platform, allowing users to create and modify activities to fit their specific needs.
A custom activity repository for Ayehu NG automation platform, allowing users to create and modify activities to fit their specific needs.
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
A Rust-based command-line tool for analyzing .apk files to detect vulnerabilities.
A Rust-based command-line tool for analyzing .apk files to detect vulnerabilities.
Script to verify audit settings for Microsoft Defender for Endpoint in GPO.
Script to verify audit settings for Microsoft Defender for Endpoint in GPO.
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
CTFd is a Capture The Flag framework with extensive features for creating and managing CTF competitions.
CTFd is a Capture The Flag framework with extensive features for creating and managing CTF competitions.