Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A detection-as-code platform for streamlining cloud security operations and responding to security incidents.
A detection-as-code platform for streamlining cloud security operations and responding to security incidents.
A JavaScript scanner built in PHP for scraping URLs and other information.
A JavaScript scanner built in PHP for scraping URLs and other information.
A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.
A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.
Archive of information, tools, and references regarding CTF competitions.
Archive of information, tools, and references regarding CTF competitions.
A demonstration site for the Acunetix Web Vulnerability Scanner, intentionally vulnerable to various web-based attacks.
A demonstration site for the Acunetix Web Vulnerability Scanner, intentionally vulnerable to various web-based attacks.
A project developed for pentesters to practice SQL Injection concepts in a controlled environment.
A project developed for pentesters to practice SQL Injection concepts in a controlled environment.
Stronghold is the easiest way to securely configure your Mac.
Syntax highlighting for Smali (Dalvik) Assembly language in Vim.
Syntax highlighting for Smali (Dalvik) Assembly language in Vim.
Collection of industry and community cybersecurity courses and materials by M. E. Kabay.
Collection of industry and community cybersecurity courses and materials by M. E. Kabay.
Find domains and subdomains related to a given domain
Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.
Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.
A guide to secure Ruby development, providing guidelines and recommendations for secure coding practices.
A guide to secure Ruby development, providing guidelines and recommendations for secure coding practices.
A general cybersecurity news site providing discussions and news on various cybersecurity topics.
A general cybersecurity news site providing discussions and news on various cybersecurity topics.
A tool for discovering company infrastructure and apps on major cloud providers, beneficial for bug bounty hunters and penetration testers.
A tool for discovering company infrastructure and apps on major cloud providers, beneficial for bug bounty hunters and penetration testers.
A collection of resources for beginners to learn assembly language.
A collection of resources for beginners to learn assembly language.
Verify scripts and executables to mitigate chain of supply attacks.
Verify scripts and executables to mitigate chain of supply attacks.
A collection of tools and resources for threat hunters.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.
A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.
Firewall, Blackhole, and Privatizing Proxy for macOS with comprehensive security features.
Firewall, Blackhole, and Privatizing Proxy for macOS with comprehensive security features.
A simple file format fuzzer for Android that can fuzz multiple readers at once
A simple file format fuzzer for Android that can fuzz multiple readers at once
A semi-automatic tool to generate YARA rules from virus samples.
A semi-automatic tool to generate YARA rules from virus samples.
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.
A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.