Free Cybersecurity Tools

Find the right solution for your security needs without any cost.

Explore 2664 curated cybersecurity tools, with 15,161 visitors searching for solutions

FREE

cred_scanner Logo

A Python command line tool that scans directories for AWS credentials in files, designed for CI/CD integration to prevent credential exposure in builds.

0
rastrea2r Logo

A cybersecurity tool for collecting and analyzing forensic artifacts on live systems.

0
HoneyHTTPD Logo

Python-based web server framework for setting up fake web servers and services with precise data responses.

0
Redexer Logo

Redexer is a reengineering tool that parses, analyzes, and modifies Android DEX files for binary manipulation and permission analysis.

0
Doorman Logo

Doorman is an osquery fleet manager that allows administrators to remotely manage the osquery configurations retrieved by nodes.

0
Workflow Templates Repository Logo

A community repository of workflow templates for the Ayehu NG platform that enables automated IT and business process execution.

0
iRET Logo

iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.

0
Tomcat Manager Honeypot Logo

A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.

0
DueDLLigence Logo

An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.

0
SSL/TLS Vulnerability Cheat Sheet Logo

A reference guide documenting known vulnerabilities in SSL/TLS protocol versions and cipher suites to help security professionals identify insecure configurations.

0
PwnAuth Logo

PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.

0
iocextract Logo

A library and command line interface for extracting URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora.

0
Quark Script Logo

Innovative tool for mobile security researchers to analyze targets with static and dynamic analysis capabilities and sharing functionalities.

0
Damn Vulnerable GraphQL Application Logo

A deliberately vulnerable GraphQL application designed for security testing and educational purposes, containing multiple intentional flaws for learning GraphQL attack and defense techniques.

0
FARA Logo

FARA is a repository of purposefully erroneous Yara rules for training security analysts.

0
ThreatMiner Logo

ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).

0
yara_repo Logo

Repository of Yara Rules created by TjNel.

0
StringSifter Logo

StringSifter is a machine learning tool that automatically ranks strings extracted from malware samples based on their relevance for analysis.

0
helm-secrets Logo

A Helm plugin that decrypts encrypted value files using sops encryption and integrates with cloud secret managers for secure secrets management in Kubernetes deployments.

0
Hyara Logo

Hyara is a plugin that simplifies writing YARA rules with various convenient features.

0
Disk Arbitrator Logo

A Mac OS X forensic utility for ensuring correct forensic procedures during disk imaging.

0
ManaTI Project Logo

Machine learning project for intuitive threat analysis with a web interface.

0
SkyWrapper Logo

SkyWrapper analyzes temporary token behaviors in AWS accounts to detect suspicious activities and generates Excel reports with findings summaries.

0