Free Cybersecurity Tools
Find the right solution for your security needs without any cost.
Explore 2615 curated tools and resources
LATEST ADDITIONS
Accessing databases stored on a machine by the Chrome browser and dumping URLs found.
YARA-Endpoint is a client-server architecture tool that can be used for endpoint protection and incident response.
Python 3 tool for parsing Yara rules with ongoing development.
A library for generating random numbers and strings of various strengths, useful in security contexts.
Apache Metron is a centralized tool for security monitoring and analysis that integrates various open-source big data technologies.
Python utility for testing the existence of domain names under different TLDs to find malicious subdomains.
A library of event-based analytics written in EQL to detect adversary behaviors, now integrated into the Detection Engine of Kibana.
A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.
Scans running processes for potentially malicious implants and dumps them.
Investigate malicious logons by visualizing and analyzing Windows Active Directory event logs with LogonTracer.
A library to access and read QEMU Copy-On-Write (QCOW) image file formats with support for zlib compression and AES-CBC encryption.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.