Find the right solution for your security needs without any cost.
Explore 2615 curated tools and resources
A PowerShell module for threat hunting via Windows Event Logs
A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.
An intrusion prevention system for SSH that blocks IP addresses after a set number of consecutive failed login attempts.
Docker file for building Androguard dependencies with an optional interactive shell environment.
Robust Python SDK and Command Line Client for interacting with IntelOwl's API.
Participation in the Red Team for Pacific Rim CCDC 2017 with insights on infrastructure design and competition tips.
Open-source project for building instrumented environments to simulate attacks and test detections.
A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
Adversary emulation framework for testing security measures in network environments.
OCaml wrapper for YARA matching engine for malware identification
Instrumentation-based approach for resolving reflective calls in Android apps.
MISP is an open source threat intelligence platform that enhances threat information sharing and analysis.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.