Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Identifies misconfigured CloudFront domains vulnerable to hijacking
Identifies misconfigured CloudFront domains vulnerable to hijacking
Weave Scope automatically generates a map of your application for troubleshooting and monitoring Docker & Kubernetes.
Weave Scope automatically generates a map of your application for troubleshooting and monitoring Docker & Kubernetes.
A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.
A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.
Firefox browser extension for displaying and editing HTTP headers.
Firefox browser extension for displaying and editing HTTP headers.
A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.
A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.
Google's Security Blog provides the latest news and insights on security and safety on the Internet.
Google's Security Blog provides the latest news and insights on security and safety on the Internet.
A tool for finding AWS credentials in files, optimized for Jenkins integration.
A cybersecurity tool for collecting and analyzing forensic artifacts on live systems.
A cybersecurity tool for collecting and analyzing forensic artifacts on live systems.
Python-based web server framework for setting up fake web servers and services with precise data responses.
Python-based web server framework for setting up fake web servers and services with precise data responses.
Redexer is a reengineering tool for Android app binaries with features like RefineDroid and Dr. Android.
Redexer is a reengineering tool for Android app binaries with features like RefineDroid and Dr. Android.
Doorman is an osquery fleet manager that allows administrators to remotely manage the osquery configurations retrieved by nodes.
Doorman is an osquery fleet manager that allows administrators to remotely manage the osquery configurations retrieved by nodes.
Repository of templates for Ayehu's workflows with the ability to design, execute, and automate IT and business processes.
Repository of templates for Ayehu's workflows with the ability to design, execute, and automate IT and business processes.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.
A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.
DueDLLigence is an open-source tool for identifying and analyzing DLL hijacking vulnerabilities in Windows applications, providing automated analysis and remediation guidance.
DueDLLigence is an open-source tool for identifying and analyzing DLL hijacking vulnerabilities in Windows applications, providing automated analysis and remediation guidance.
A network recon framework including tools for passive and active recon
A network recon framework including tools for passive and active recon
A reference cheat sheet documenting vulnerabilities in SSL/TLS protocol versions and cipher suites for security assessment purposes.
A reference cheat sheet documenting vulnerabilities in SSL/TLS protocol versions and cipher suites for security assessment purposes.
PwnAuth is an open-source tool for generating and managing authentication tokens for penetration testing and red teaming exercises.
PwnAuth is an open-source tool for generating and managing authentication tokens for penetration testing and red teaming exercises.
A library and command line interface for extracting URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora.
A library and command line interface for extracting URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora.
Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.
Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.
A deliberately weak and insecure implementation of GraphQL for testing and practicing GraphQL security
A deliberately weak and insecure implementation of GraphQL for testing and practicing GraphQL security
FARA is a repository of purposefully erroneous Yara rules for training security analysts.
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
Repository of Yara Rules created by TjNel.