Free Cybersecurity Tools

Find the right solution for your security needs without any cost.

Explore 2630 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

FREE

SOAR Logo

A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.

0
RTIR Logo

Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.

0
0xf.at Hackits Logo

Solve password-riddles on a website without logins or ads.

0
Subra Logo

A simple web-based interface for subdomain enumeration using the subfinder tool.

0
NoSQL-Honeypot-Framework (NoPo) Logo

An open source honeypot for NoSQL databases with support for Redis and additional features for detecting attackers and logging attack incidents.

0
Enterprise Detection & Response: A Simple Hunting Maturity Model Logo

A simple maturity model for enterprise detection and response

0
Volexity Threat Intelligence Repository Logo

Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.

0
SharpShares Logo

SharpShares efficiently enumerates and maps network shares and resolves names within a domain.

0
Boomerang Decompiler Logo

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

0
Maltrail Logo

Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.

0
Reverse Engineering for Beginners Logo

A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

0
FLARE-VM Logo

FLARE-VM is a Windows virtual machine setup tool that automates the installation and configuration of reverse engineering and malware analysis software using Chocolatey and Boxstarter technologies.

0
YARA-Signator Logo

Automatic YARA rule generation for malware repositories.

0
App Detonator Logo

A tool for dynamic analysis of mobile applications in a controlled environment.

0
PINCE Logo

PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.

0
iam-lint Logo

A GitHub action that lints AWS IAM policy documents to identify security issues and misconfigurations with configurable severity levels and custom rules.

0
YaYaGen Logo

Automatic YARA rule generator based on Koodous reports with limited false positives.

0
SOARCA Logo

SOARCA is an open-source SOAR platform that automates security incident response workflows using standardized CACAOv2 playbooks and multiple integration interfaces.

0
Papa Shango Logo

A Linux process injection tool that uses ptrace() to inject assembly-based shellcode into running processes without NULL byte restrictions.

0
FeatherDuster (and Cryptanalib) Logo

FeatherDuster is a cryptanalysis tool that automatically identifies and exploits weaknesses in cryptographic systems by analyzing ciphertext files.

0
DataPlane.org Logo

Dataplane.org is a nonprofit organization providing free data, tools, and analysis to increase awareness of Internet trends, anomalies, threats, and misconfigurations.

0
YAIDS Logo

A multi-threaded intrusion detection system using Yara for network and stream IDS

0
Payloads All The Things Logo

A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.

0
Magic Rescue Logo

A tool for recovering files by scanning block devices and extracting them based on 'magic bytes' in file contents.

0