Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.
A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.
Toolkit for secure destruction of sensitive data with customizable overwrite methods.
Toolkit for secure destruction of sensitive data with customizable overwrite methods.
A Python library for loading and executing Beacon Object Files (BOFs) in-memory.
A Python library for loading and executing Beacon Object Files (BOFs) in-memory.
Security Affairs provides comprehensive insights into global cybersecurity threats and protective measures.
Security Affairs provides comprehensive insights into global cybersecurity threats and protective measures.
A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.
A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.
A tool that generates least privilege IAM policies for AWS services
A tool that generates least privilege IAM policies for AWS services
A tool for analyzing Android applications in local storage with various functionalities.
A tool for analyzing Android applications in local storage with various functionalities.
Repository with projects for photo and video hashing, content moderation, and signal exchange.
Repository with projects for photo and video hashing, content moderation, and signal exchange.
A collection of Yara rules for detecting malware evasion techniques
A collection of Yara rules for detecting malware evasion techniques
A laser tripwire tool to hide windows, lock computer, or execute custom scripts upon motion detection.
A laser tripwire tool to hide windows, lock computer, or execute custom scripts upon motion detection.
Web server scanner for identifying security vulnerabilities.
A collection of PCAPs for ICS/SCADA utilities and protocols with the option for users to contribute.
OWASP Project for making vulnerability management easier.
A tool to find S3 buckets from HTML, JS, and bucket misconfiguration testing
A tool to find S3 buckets from HTML, JS, and bucket misconfiguration testing
A wargame designed to test your hacking skills and knowledge
Audits JavaScript projects for known vulnerabilities and outdated package versions using OSS Index v3 REST API.
A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.
A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.
Tool to disable vulnerable features in Windows and popular applications for enhanced security.
Tool to disable vulnerable features in Windows and popular applications for enhanced security.
Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.
Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
Rekall is a discontinued project that aimed to improve memory analysis methodology but faced challenges due to the nature of in-memory structure and increasing security measures.
Rekall is a discontinued project that aimed to improve memory analysis methodology but faced challenges due to the nature of in-memory structure and increasing security measures.