Find the right solution for your security needs without any cost.Explore 2627 curated tools and resources
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Tool to clean Exif data from images in AWS S3 bucket
JSON.parse() drop-in replacement with prototype poisoning protection.
WordPress plugin to reduce comment spam with a smarter honeypot.
WordPress plugin to reduce comment spam with a smarter honeypot.
Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.
Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
A collection of AWS security architectures for various security operations.
A collection of AWS security architectures for various security operations.
A network protocol analyzer for capturing and analyzing network traffic with a focus on TCP/IP flow reconstruction and response time tracking.
A network protocol analyzer for capturing and analyzing network traffic with a focus on TCP/IP flow reconstruction and response time tracking.
A library for integrating communication channels with the Cobalt Strike External C2 server.
A library for integrating communication channels with the Cobalt Strike External C2 server.
Generate Yara rules from function basic blocks in x64dbg.
Generate Yara rules from function basic blocks in x64dbg.
A learning and training project demonstrating common configuration errors in cloud environments.
A learning and training project demonstrating common configuration errors in cloud environments.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
A Splunk app mapped to MITRE ATT&CK to guide threat hunts.
Multi-account cloud security tool for AWS with real-time reporting and auto-remediation capabilities.
Multi-account cloud security tool for AWS with real-time reporting and auto-remediation capabilities.
IAM Zero detects IAM issues and suggests least-privilege policies for AWS and other cloud platforms.
IAM Zero detects IAM issues and suggests least-privilege policies for AWS and other cloud platforms.