Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A set of YARA rules for identifying files containing sensitive information
A set of YARA rules for identifying files containing sensitive information
Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.
Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.
A non-profit organization providing live-fire cyber warfare ranges for training and up-skilling cybersecurity professionals.
A non-profit organization providing live-fire cyber warfare ranges for training and up-skilling cybersecurity professionals.
A visualization tool for uploading and visualizing data as graphs on-the-fly, based on AfterGlow and running on Django.
A visualization tool for uploading and visualizing data as graphs on-the-fly, based on AfterGlow and running on Django.
A framework for creating and executing pynids-based decoders and detectors of APT tradecraft
A framework for creating and executing pynids-based decoders and detectors of APT tradecraft
Automated Android Malware Analysis tool
Realtime privacy monitoring service for smartphones that analyzes how apps handle private information.
Realtime privacy monitoring service for smartphones that analyzes how apps handle private information.
Endpoint security solution for businesses with advanced threat protection and management
Endpoint security solution for businesses with advanced threat protection and management
A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.
A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.
A free, open source collection of tools for forensic artifact and image analysis.
A free, open source collection of tools for forensic artifact and image analysis.
Python application to translate Zeek logs into ElasticSearch's bulk load JSON format with detailed instructions and features.
Python application to translate Zeek logs into ElasticSearch's bulk load JSON format with detailed instructions and features.
A CLI tool for securely generating keys, passwords, and providing credentials without files, primarily for building secure BOSH deployments using Vault and Spruce.
A CLI tool for securely generating keys, passwords, and providing credentials without files, primarily for building secure BOSH deployments using Vault and Spruce.
Collection of Yara rules for file identification and classification
Collection of Yara rules for file identification and classification
Check if your email address has been involved in a data breach.
NSA's cybersecurity advisories and guidance on evolving threats and mitigations.
NSA's cybersecurity advisories and guidance on evolving threats and mitigations.
ShadowCopy Analyzer is a tool for cybersecurity researchers to analyze and utilize the ShadowCopy technology for file recovery and system restoration.
ShadowCopy Analyzer is a tool for cybersecurity researchers to analyze and utilize the ShadowCopy technology for file recovery and system restoration.
Open source application to instantly remediate common security issues through the use of AWS Config.
Open source application to instantly remediate common security issues through the use of AWS Config.
Tool used to scan a range of IP addresses to identify active hosts and gather information about them.
Tool used to scan a range of IP addresses to identify active hosts and gather information about them.
A service that analyzes and visualizes security data to investigate potential security issues.
A service that analyzes and visualizes security data to investigate potential security issues.
Reformat and re-indent bookmarklets, ugly JavaScript, and unpack scripts with options available via UI.
Reformat and re-indent bookmarklets, ugly JavaScript, and unpack scripts with options available via UI.
A method for profiling SSL/TLS Clients with easy-to-produce client fingerprints.
A method for profiling SSL/TLS Clients with easy-to-produce client fingerprints.
A YARA interactive debugger for the YARA language written in Rust, providing features like function calls, constant evaluation, and string matching.
A tool for auditing and reporting Unix host security with the ability to perform a lockdown.
A tool for auditing and reporting Unix host security with the ability to perform a lockdown.
A tutorial on setting up Dionaea on an EC2 instance in 20 minutes