Find the right solution for your security needs without any cost.
Explore 2615 curated tools and resources
Python-based toolkit for network hacking with various implemented techniques and supported by Securetia SRL.
A tool that discovers all AWS resources created in an account
A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.
Curated datasets for developing and testing detections in SIEM installations.
Deliberately vulnerable CI/CD environment with 11 challenges to practice security.
A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.
Dump iOS Frequent Locations from StateModel#.archive files.
An Event Hub to gather, process, and monitor system events and link them to an inventory.
Markdown version of OWASP Testing Checklist v4 for various platforms.
Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
SentryPeer is a fraud detection tool that monitors and detects fraudulent activities on SIP servers, capturing IP addresses and phone numbers of suspicious activities and providing a notification system to service providers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.