Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.
Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.
A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.
A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.
Open source security auditing tool to search and dump system configuration.
Open source security auditing tool to search and dump system configuration.
Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.
Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.
An open-source framework for testing and validating the security of AWS services and resources.
An open-source framework for testing and validating the security of AWS services and resources.
6Guard is an IPv6 attack detector sponsored by Google Summer of Code 2012 and supported by The Honeynet Project organization.
6Guard is an IPv6 attack detector sponsored by Google Summer of Code 2012 and supported by The Honeynet Project organization.
A static analysis framework for extracting key characteristics from various file formats
A static analysis framework for extracting key characteristics from various file formats
Altoro Mutual offers online banking, real estate financing, business credit cards, retirement solutions, and prioritizes privacy and security.
Altoro Mutual offers online banking, real estate financing, business credit cards, retirement solutions, and prioritizes privacy and security.
A honeypot that logs NTP packets into a Redis database to detect DDoS attempts.
A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.
A CSP plugin for hapi with per-route configuration options.
A powerful penetration testing platform for identifying vulnerabilities and weaknesses in computer systems.
A powerful penetration testing platform for identifying vulnerabilities and weaknesses in computer systems.
A Burp Suite plugin for automatically adding XSS and SQL payload to fuzz
A Burp Suite plugin for automatically adding XSS and SQL payload to fuzz
A ruby script that scans for vulnerable 3rd-party web applications
A ruby script that scans for vulnerable 3rd-party web applications
Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.
Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.
shellfirm will prompt challenges to verify risky shell commands, acting as a captcha for your terminal.
shellfirm will prompt challenges to verify risky shell commands, acting as a captcha for your terminal.
Go bindings for YARA with installation and build instructions.
A tool for reading Portable Executable (PE) files with detailed information about the file structure.
A tool for reading Portable Executable (PE) files with detailed information about the file structure.
A free training course and lab environment for learning to test and attack cloud infrastructure, including AWS and Azure.
A free training course and lab environment for learning to test and attack cloud infrastructure, including AWS and Azure.
Metabadger helps prevent SSRF attacks on AWS EC2 by automating upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
Metabadger helps prevent SSRF attacks on AWS EC2 by automating upgrades to the more secure Instance Metadata Service v2 (IMDSv2).
A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.
A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.