Find the right solution for your security needs without any cost.
Explore 2615 curated tools and resources
Firewall, Blackhole, and Privatizing Proxy for macOS with comprehensive security features.
A simple file format fuzzer for Android that can fuzz multiple readers at once
A semi-automatic tool to generate YARA rules from virus samples.
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.
SharpAppLocker provides a C# adaptation of the Get-AppLockerPolicy cmdlet for managing application control policies.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
Multi-cloud OSINT tool for enumerating public resources in AWS, Azure, and Google Cloud.
Macro_Pack is a tool used to automate obfuscation and generation of Office documents for pentest, demo, and social engineering assessments.
A free DNS recursive service that blocks malicious host names and protects user privacy.
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.
Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.