Free Cybersecurity Tools

Find the right solution for your security needs without any cost.

Explore 2621 curated cybersecurity tools, with 15,373 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

FREE

SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs Logo

A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.

0
Linux Detection Engineering -  A primer on persistence mechanisms Logo

A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.

0
Ransomware Tool Matrix Logo

The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.

0
Exposing Security Observability Gaps in AWS Native Security Tooling Logo

A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

0
OpenVAS Logo

OpenVAS is an open-source vulnerability scanner that provides extensive testing capabilities for identifying security weaknesses in networks and systems.

2
Wazuh Logo

Wazuh is an open-source security platform offering unified XDR and SIEM protection for endpoints and cloud workloads, integrating various security functions into a single architecture.

2
Arkime Logo

Arkime is an open-source network capture and analysis tool that provides comprehensive network visibility, facilitating swift identification and resolution of security and network issues.

1
EvoMaster Logo

EvoMaster is an AI-driven tool that automatically generates system-level test cases for web APIs and enterprise applications using evolutionary algorithms and dynamic program analysis.

0
tryharder Logo

A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.

0
Rogueapps Logo

A collaborative repository documenting TTPs and attack patterns associated with malicious OIDC/OAuth 2.0 applications.

0
ffufai Logo

An AI-powered wrapper for ffuf that automatically suggests relevant file extensions for web fuzzing based on target URL analysis and response headers.

0
GitHub Actions Attack Diagram Logo

A visual guide that maps attack vectors and exploitation techniques for identifying vulnerabilities in GitHub Actions configurations and CI/CD pipelines.

0
ScubaGear Logo

ScubaGear is a PowerShell-based assessment tool that evaluates Microsoft 365 tenant configurations against CISA security baselines using Open Policy Agent and generates compliance reports.

0
Read-Teaming-TTPs Logo

A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.

0
Cloudflare Learning Center Logo

The Cloudflare Learning Center provides educational resources covering various cybersecurity and internet-related topics, including DDoS attacks, CDNs, DNS, web application security, serverless computing, encryption protocols, bots, cloud computing, Zero Trust security, SASE, networking, data privacy, video streaming, email security, and AI.

0
LLM Guard Logo

LLM Guard is a security toolkit that enhances the safety and security of interactions with Large Language Models (LLMs) by providing features like sanitization, harmful language detection, data leakage prevention, and resistance against prompt injection attacks.

1
Node.js Goof Logo

Node.js Goof is a vulnerable Node.js demo application containing multiple security vulnerabilities for testing and educational purposes.

0
Interlace Logo

A tool to easily automate and multithread your pentesting and bug bounty workflow without any coding

0
Bento Toolkit Logo

A Docker-based penetration testing toolkit that provides a portable environment with GUI support and pre-installed security tools for web application testing and CTF activities.

0
getallurls (gau) Logo

Fetches known URLs from various sources for a given domain

0
Kunai Logo

Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.

0
Grype Logo

Grype is a vulnerability scanner for container images and filesystems that scans for known vulnerabilities and supports various image formats.

0
Syft Logo

A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.

0
BinaryAnalysisPlatform (BAP) Logo

A binary analysis platform for analyzing binary programs

0