Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Ice provides a birds-eye view of cloud resources and usage patterns in AWS.
Zui is a desktop app for exploring and working with data, powered by Zed's 'Super-Structured Data' approach.
Zui is a desktop app for exploring and working with data, powered by Zed's 'Super-Structured Data' approach.
A vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfigurations.
A vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfigurations.
CobaltBus enables Cobalt Strike C2 traffic via Azure Servicebus for enhanced covert operations.
CobaltBus enables Cobalt Strike C2 traffic via Azure Servicebus for enhanced covert operations.
NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.
NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.
Automated signature creation using honeypots for network intrusion detection systems.
Automated signature creation using honeypots for network intrusion detection systems.
A comprehensive guide to using Hashcat for password cracking
A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.
A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.
A platform to learn SQL injection techniques and methods
A platform to learn SQL injection techniques and methods
A collection of resources for securing AWS environments using the CIS Amazon Web Services Foundations Benchmark 1.1
A collection of resources for securing AWS environments using the CIS Amazon Web Services Foundations Benchmark 1.1
Sysmon for Linux is a tool that monitors and logs system activity with advanced filtering to identify malicious activity.
Sysmon for Linux is a tool that monitors and logs system activity with advanced filtering to identify malicious activity.
A powerful command-line packet analyzer and a portable C/C++ library for network traffic capture with comprehensive documentation.
A powerful command-line packet analyzer and a portable C/C++ library for network traffic capture with comprehensive documentation.
A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.
A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.
A comprehensive resource for securing Active Directory, including attack methods and effective defenses.
A comprehensive resource for securing Active Directory, including attack methods and effective defenses.
A repository providing guidance on collecting security-relevant Windows event logs using Windows Event Forwarding (WEF).
A repository providing guidance on collecting security-relevant Windows event logs using Windows Event Forwarding (WEF).
HonnyPotter is a WordPress plugin that logs all failed login attempts, with a caution to use it at your own risk.
HonnyPotter is a WordPress plugin that logs all failed login attempts, with a caution to use it at your own risk.
Search gadgets on binaries to facilitate ROP exploitation.
Python library and command line tools for log visualization with interactive plots.
Python library and command line tools for log visualization with interactive plots.
Netcap efficiently converts network packets into structured audit records for machine learning algorithms, using Protocol Buffers for encoding.
Netcap efficiently converts network packets into structured audit records for machine learning algorithms, using Protocol Buffers for encoding.
A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.
A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.
Open-source rules for detecting and preventing email attacks like BEC, malware, and credential phishing.
Open-source rules for detecting and preventing email attacks like BEC, malware, and credential phishing.
Interactive computational environment for code execution, text, and media combination.
Interactive computational environment for code execution, text, and media combination.
A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.
A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.