Free Cybersecurity Tools

Find the right solution for your security needs without any cost.

Explore 2630 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

FREE

Signature-Base Logo

YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.

0
Fenrir Simple Bash IOC Scanner Logo

A lightweight bash script IOC scanner for Linux/Unix/macOS systems that detects malicious indicators through hash matching, filename analysis, string searches, and C2 server identification without requiring installation.

0
Kippo Stats Logo

A webapp for displaying statistics about your kippo SSH honeypot.

0
AWS Security Hub Logo

Automate AWS security checks and centralize security alerts.

0
Yara File Checker Logo

A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.

0
yaramod Logo

Yaramod is a library for parsing YARA rules into AST and building new YARA rulesets with C++ programming interface.

0
DistroWatch.com Logo

A website for information on Linux and BSD distributions.

0
Meerkat Logo

A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.

0
smart-honeypot PHP Script Logo

PHP Script demonstrating a smart honey pot for email form protection.

0
Nuke My LUKS Logo

A network-triggered emergency tool that overwrites LUKS encryption headers with random data to prevent forced decryption in high-risk situations.

0
YAYA - Yet Another Yara Automaton Logo

Automatically curate open-source Yara rules and run scans with YAYA.

0
NoSQLMap Logo

NoSQLMap is an open source Python tool that automates NoSQL injection attacks and exploits configuration weaknesses in NoSQL databases to disclose or clone data.

0
Reversing and Exploiting ARM Binaries: rwthCTF Trafman Logo

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

0
APT & Cybercriminals Campaign Collection Logo

A collection of APT and cybercriminals campaigns with various resources and references.

0
nfspy Logo

ID-spoofing NFS client

0
Hardwear.io Conference 2018 Logo

Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.

0
RABCDAsm Logo

RABCDAsm is a collection of utilities for ActionScript 3 assembly/disassembly and SWF file manipulation.

0
Penetration Testing Execution Standard (PTES) Logo

A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.

0
DCEPT Logo

A honeytoken-based tripwire for Microsoft's Active Directory to detect privilege escalation attempts

0
imobax Logo

A command-line tool for extracting data from iOS mobile device backups created by iTunes on macOS systems.

0
C2concealer Logo

A command line tool that generates randomized malleable C2 profiles for Cobalt Strike to vary command and control communication patterns.

0
OWASP Mobile Application Security Testing Guide (MASTG) Logo

Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.

0
timeliner Logo

Timeliner is a digital forensics tool that rewrites mactime with an advanced expression engine for complex timeline filtering using BPF syntax.

0