Find the right solution for your security needs without any cost.
Explore 2615 curated tools and resources
A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.
A Docker image with tools for solving Steganography challenges and screening scripts for analyzing files.
A framework/scripting tool to standardize and simplify the process of scripting favorite Live Acquisition utilities for Incident Responders.
CapTipper is a python tool to analyze, explore, and revive HTTP malicious traffic.
A tool that assesses AWS accounts for subdomain hijacking vulnerabilities in Route53 and CloudFront configurations.
Recoverjpeg is a tool for recovering JPEG images from damaged storage media.
Hindsight is a free tool for analyzing web artifacts from Google Chrome/Chromium browsers and presenting the data in a timeline for forensic analysis.
A tool for redirecting HTTP and HTTPS requests to other URLs.
Cybersecurity project for security monitoring of Node.js applications.
A PoC tool for utilizing GPT3.5 in developing an SMTP honeypot.
Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.
AWS Scout2 is a security tool for AWS administrators to assess their environment's security posture.
Static application security testing (SAST) tool for scanning source code against security and privacy risks.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.