Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A command-line tool for extracting detailed information from JPEG files, including image dimensions, compression, and metadata.
A command-line tool for extracting detailed information from JPEG files, including image dimensions, compression, and metadata.
CrowdStrike Falcon Orchestrator is a Windows-based application for workflow automation and security response.
CrowdStrike Falcon Orchestrator is a Windows-based application for workflow automation and security response.
A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.
A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.
Taxii2 server for interacting with taxii services.
Web interface for the Volatility Memory Analysis framework with advanced features.
Web interface for the Volatility Memory Analysis framework with advanced features.
Real-time, container-based file scanning system for threat hunting and incident response.
Real-time, container-based file scanning system for threat hunting and incident response.
Kiterunner is a tool for lightning-fast traditional content discovery and bruteforcing API endpoints in modern applications.
Kiterunner is a tool for lightning-fast traditional content discovery and bruteforcing API endpoints in modern applications.
A FTP honeypot tool for detecting and capturing malicious file upload attempts.
A FTP honeypot tool for detecting and capturing malicious file upload attempts.
Vim syntax-highlighting plugin for YARA rules with support up to v4.3.
Vim syntax-highlighting plugin for YARA rules with support up to v4.3.
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
Detect off-instance key usage in AWS by analyzing CloudTrail files locally.
Detect off-instance key usage in AWS by analyzing CloudTrail files locally.
A honeypot trap for Symfony2 forms to reduce spam submissions.
A honeypot trap for Symfony2 forms to reduce spam submissions.
Hoarder is a tool to collect and parse windows artifacts.
A tool for injecting and loading executables with a focus on stealth techniques.
A tool for injecting and loading executables with a focus on stealth techniques.
A set of instructions for the Dalvik virtual machine to manipulate registers and values in Android applications.
A set of instructions for the Dalvik virtual machine to manipulate registers and values in Android applications.
A Burp extension to check JWT tokens for potential weaknesses
Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.
Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.
KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.
Blue-team capture the flag competition for improving cybersecurity skills.
Blue-team capture the flag competition for improving cybersecurity skills.
A powerful tool for extracting passwords and performing various Windows security operations.
A powerful tool for extracting passwords and performing various Windows security operations.
YARA module for supporting DCSO format bloom filters with hashlookup capabilities.
YARA module for supporting DCSO format bloom filters with hashlookup capabilities.