Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.
Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.
A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.
Database protection suite with field-level encryption and intrusion detection
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
Open-source Java application for creating proxies for traffic analysis & modification.
Open-source Java application for creating proxies for traffic analysis & modification.
Identify AWS IAM permissions by brute-forcing API calls.
Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.
Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.
One of the oldest hacker conventions in America, offering a unique and personal experience.
One of the oldest hacker conventions in America, offering a unique and personal experience.
Orochi is a collaborative forensic memory dump analysis framework.
Online cybersecurity conference with speakers' talks and interactive Q&A sessions.
Online cybersecurity conference with speakers' talks and interactive Q&A sessions.
Securely store and access AWS credentials in a development environment.
RegRippy is a modern Python 3 alternative to RegRipper for extracting data from Windows registry hives.
mac_apt is a versatile DFIR tool for processing Mac and iOS images, offering extensive artifact extraction capabilities and cross-platform support.
mac_apt is a versatile DFIR tool for processing Mac and iOS images, offering extensive artifact extraction capabilities and cross-platform support.
FraudGuard is a service that provides real-time internet traffic analysis and IP tracking to help validate usage and prevent fraud.
FraudGuard is a service that provides real-time internet traffic analysis and IP tracking to help validate usage and prevent fraud.
Django based web application for network traffic analysis with protocol handling capabilities.
Django based web application for network traffic analysis with protocol handling capabilities.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.
Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.
A module that enforces HTTPS connections and automatically redirects non-encrypted HTTP requests to HTTPS.
A module that enforces HTTPS connections and automatically redirects non-encrypted HTTP requests to HTTPS.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
A specification/framework for extending default C2 communication channels in Cobalt Strike
A specification/framework for extending default C2 communication channels in Cobalt Strike
A non-commercial wargame site offering pwn challenges related to system exploitation with different difficulty levels.
A non-commercial wargame site offering pwn challenges related to system exploitation with different difficulty levels.
A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.
Introduction to using GScript for Red Teams