Free Cybersecurity Tools

Find the right solution for your security needs without any cost.

Explore 2630 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

FREE

GrokEVT Logo

GrokEVT is a tool for reading Windows event log files and converting them to a human-readable format.

0
Checksec Logo

A bash script that analyzes executable files to check security properties like PIE, RELRO, canaries, ASLR, and Fortify Source protections.

0
CloudFrunt Logo

CloudFrunt identifies misconfigured Amazon CloudFront domains that are vulnerable to hijacking due to improper CNAME configuration.

0
Weave Scope Logo

Weave Scope is a real-time visualization and monitoring tool that automatically maps Docker container infrastructures and microservices, providing interactive topology views and direct container management capabilities.

0
Yara Rule Generator Logo

A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.

0
HTTP Header Live Logo

Firefox browser extension for displaying and editing HTTP headers.

0
Burp-Yara-Rules Logo

A collection of Yara rules for the Burp Yara-Scanner extension that helps identify malicious software and infected web pages during web application security assessments.

0
Google Security Blog Logo

Google's Security Blog provides the latest news and insights on security and safety on the Internet.

0
cred_scanner Logo

A Python command line tool that scans directories for AWS credentials in files, designed for CI/CD integration to prevent credential exposure in builds.

0
rastrea2r Logo

A cybersecurity tool for collecting and analyzing forensic artifacts on live systems.

0
HoneyHTTPD Logo

Python-based web server framework for setting up fake web servers and services with precise data responses.

0
Redexer Logo

Redexer is a reengineering tool that parses, analyzes, and modifies Android DEX files for binary manipulation and permission analysis.

0
Doorman Logo

Doorman is an osquery fleet manager that allows administrators to remotely manage the osquery configurations retrieved by nodes.

0
Workflow Templates Repository Logo

A community repository of workflow templates for the Ayehu NG platform that enables automated IT and business process execution.

0
iRET Logo

iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.

0
Tomcat Manager Honeypot Logo

A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.

0
DueDLLigence Logo

An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.

0
SSL/TLS Vulnerability Cheat Sheet Logo

A reference guide documenting known vulnerabilities in SSL/TLS protocol versions and cipher suites to help security professionals identify insecure configurations.

0
PwnAuth Logo

PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.

0
iocextract Logo

A library and command line interface for extracting URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora.

0
Quark Script Logo

Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.

0
Damn Vulnerable GraphQL Application Logo

A deliberately vulnerable GraphQL application designed for security testing and educational purposes, containing multiple intentional flaws for learning GraphQL attack and defense techniques.

0
FARA Logo

FARA is a repository of purposefully erroneous Yara rules for training security analysts.

0