Find the right solution for your security needs without any cost.Explore 2632 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A collection of security workshops and hands-on content for AWS security services and techniques
A collection of security workshops and hands-on content for AWS security services and techniques
A set of tools for securing JavaScript projects against software supply chain attacks.
A set of tools for securing JavaScript projects against software supply chain attacks.
Python module for fast packet parsing with TCP/IP protocol definitions.
A tool for searching through public EBS snapshots for secrets, organized as an Elastic Beanstalk application.
A tool for searching through public EBS snapshots for secrets, organized as an Elastic Beanstalk application.
An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.
An annual jeopardy-style capture-the-flag contest with challenges related to cybersecurity.
Automate OSINT for threat intelligence and attack surface mapping with SpiderFoot.
Automate OSINT for threat intelligence and attack surface mapping with SpiderFoot.
A lab designed for defenders to quickly build a Windows domain pre-loaded with security tooling and best practices in system logging configurations.
A lab designed for defenders to quickly build a Windows domain pre-loaded with security tooling and best practices in system logging configurations.
Workflows for Shuffle automation tool with structured categories and customization options.
Workflows for Shuffle automation tool with structured categories and customization options.
A vulnerable web application for learning about web application vulnerabilities and writing secure code.
A vulnerable web application for learning about web application vulnerabilities and writing secure code.
Haaukins is an automated virtualization platform for cybersecurity education with a focus on capture the flag concept.
Haaukins is an automated virtualization platform for cybersecurity education with a focus on capture the flag concept.
A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.
A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.
Automated tool for detecting steganographic content in images, with F5 detection capabilities.
Automated tool for detecting steganographic content in images, with F5 detection capabilities.
A portable volatile memory acquisition tool for Linux.
A portable volatile memory acquisition tool for Linux.
A Python-based engine for automatic creation of timelines in digital forensic analysis
A Python-based engine for automatic creation of timelines in digital forensic analysis
A collection of YARA rules for research and hunting purposes.
A collection of YARA rules for research and hunting purposes.
Documentation project for Digital Forensics Artifact Repository
Documentation project for Digital Forensics Artifact Repository
A one-stop online resource for cybersecurity degree programs in the US, offering information on undergraduate and graduate levels, online programs, and career options.
A one-stop online resource for cybersecurity degree programs in the US, offering information on undergraduate and graduate levels, online programs, and career options.
Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.
Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.
Create Docker container images for testing and long-term use.
Create Docker container images for testing and long-term use.
A set of interrelated detection rules for improving detection and hunting visibility and context
A set of interrelated detection rules for improving detection and hunting visibility and context
A Python web application honeypot that provides simple statistics for the Glastopf.
Modular framework for pentesting Modbus protocol with diagnostic and offensive features.
Modular framework for pentesting Modbus protocol with diagnostic and offensive features.
A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.
A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.