Find the right solution for your security needs without any cost.
Explore 2615 curated tools and resources
A set of configuration files to use with EclecticIQ's OpenTAXII implementation for MISP integration.
CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.
A comprehensive IT infrastructure automation platform for managing hybrid infrastructure through configuration, patch, and security management.
Leading open source automated malware analysis system.
A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks
A web service for easier AWS IAM permissions and credential management with various login methods and IAM Self-Service Wizard.
High-performance remote packet capture and collection tool used for forensic analysis in cloud workloads.
AirIAM is an AWS IAM to least privilege Terraform execution framework that compiles AWS IAM usage and leverages that data to create a least-privilege IAM Terraform.
Netis Cloud Probe is an open source project for capturing and analyzing network packets across different machines.
Educational resources for reverse engineering tutorials by lena151.
A library to access and parse Windows XML Event Log (EVTX) format, useful for digital forensics and incident response.
A graph-based tool for visualizing effective access and resource relationships within AWS
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.