Free Cybersecurity Tools

Find the right solution for your security needs without any cost.

Explore 2630 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

FREE

APFS FUSE Driver for Linux Logo

A read-only FUSE driver that enables Linux systems to mount and access Apple File System (APFS) volumes, including encrypted and fusion drives.

0
OWASP WrongSecrets Logo

OWASP WrongSecrets is an educational game that teaches proper secrets management by demonstrating common mistakes through interactive challenges across various deployment platforms.

0
ssh-audit by arthepsy Logo

A tool for SSH server auditing with comprehensive analysis capabilities.

0
Pair Domains Logo

Domain registration and web hosting services with free features and 24/7 customer support

0
ZeusCloud Logo

ZeusCloud is an open source cloud security platform that discovers AWS assets, identifies attack paths, and provides remediation guidance with customizable compliance controls.

0
InlineWhispers Logo

A tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) for offensive security purposes.

0
Binary Exploitation Tutorial Logo

Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.

0
3GL Logo

3GL is a high-level programming language with a focus on ASM for 6502.

0
yarAnalyzer Logo

yarAnalyzer creates statistics on a yara rule set and files in a sample directory, generating tables and CSV files, including an inventory feature.

0
ClamAV Logo

ClamAV is an open-source antivirus engine that detects trojans, viruses, malware, and other malicious threats.

0
Windows Privilege Escalation Techniques Logo

A list of Windows privilege escalation techniques, categorized and explained in detail.

0
HTB Academy Logo

HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.

1
AWS WAF Logo

AWS Web Application Firewall (WAF) for protecting web applications from common exploits.

0
MushMush Foundation Logo

Non-profit organization supporting the advancement of open source software.

0
RedHunt Linux Distribution (VM) v2 Logo

A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.

0
tiq-test Logo

A data visualization and statistical analysis tool for measuring the quality and effectiveness of threat intelligence indicator feeds through various analytical tests.

0
Event Query Language (EQL) Logo

Browse a library of EQL analytics now natively integrated in Elasticsearch.

0
Shellclear Logo

A command-line tool that secures shell command history by clearing sensitive commands, displaying command summaries, and providing stash functionality for presentations across multiple shell environments.

0
BadCyber Logo

A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.

0
Zircolite Logo

Standalone SIGMA-based detection tool for EVTX, Auditd, Sysmon for Linux, XML or JSONL/NDJSON Logs.

0
Incident Response Investigation System (IRIS) Logo

A web collaborative platform for incident responders to share technical details during investigations, shipped in Docker containers for easy installation and upgrades.

0
Mellivora Mellivora Logo

Mellivora Mellivora is a PHP-based CTF engine that provides comprehensive competition hosting capabilities with challenge management, team scoring, and administrative tools for cybersecurity competitions.

0
AppUse Logo

A VM for mobile application security testing, Android and iOS applications, with custom-made tools and scripts.

0
Dirty COW Logo

A local privilege escalation vulnerability in the Linux kernel known for its catchy name and potential damages.

0