Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A blog post about bypassing AppLocker using PowerShell diagnostic scripts
A blog post about bypassing AppLocker using PowerShell diagnostic scripts
OSSEC is a versatile HIDS known for its powerful log analysis and intrusion detection capabilities.
OSSEC is a versatile HIDS known for its powerful log analysis and intrusion detection capabilities.
A security feature to prevent unexpected manipulation of fetched resources.
A security feature to prevent unexpected manipulation of fetched resources.
Collection of recent infosec/hacking videos from conferences.
Collection of recent infosec/hacking videos from conferences.
Command line interface for managing and inspecting images, policies, subscriptions, and registries with support for various operating systems and packages.
Command line interface for managing and inspecting images, policies, subscriptions, and registries with support for various operating systems and packages.
Leading provider of free cybersecurity training resources
Brian Krebs is a cybersecurity journalist and blogger, known for his in-depth reporting on cybercrime and cybersecurity issues.
Brian Krebs is a cybersecurity journalist and blogger, known for his in-depth reporting on cybercrime and cybersecurity issues.
Enables code injection into Mac OS X processes with detailed version history and contributing guidelines.
Enables code injection into Mac OS X processes with detailed version history and contributing guidelines.
Security-Guard helps secure microservices and serverless containers by detecting and blocking exploits.
Security-Guard helps secure microservices and serverless containers by detecting and blocking exploits.
RedELK enhances Red Team operations with SIEM capabilities to monitor and alert on Blue Team activities.
A shell script for basic forensic collection of various artefacts from UNIX systems.
A shell script for basic forensic collection of various artefacts from UNIX systems.
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
Tool for managing Yara rules on VirusTotal
A custom activity repository for Ayehu NG automation platform, allowing users to create and modify activities to fit their specific needs.
A custom activity repository for Ayehu NG automation platform, allowing users to create and modify activities to fit their specific needs.
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
A Rust-based command-line tool for analyzing .apk files to detect vulnerabilities.
A Rust-based command-line tool for analyzing .apk files to detect vulnerabilities.
Script to verify audit settings for Microsoft Defender for Endpoint in GPO.
Script to verify audit settings for Microsoft Defender for Endpoint in GPO.
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
A tool to find and search for registered CVEs, creating a local CVE database for offline use.
CTFd is a Capture The Flag framework with extensive features for creating and managing CTF competitions.
CTFd is a Capture The Flag framework with extensive features for creating and managing CTF competitions.
A collection of Yara signatures for identifying malware and other threats
A collection of Yara signatures for identifying malware and other threats
Honeypot for analyzing data with customizable services and logging capabilities.
Honeypot for analyzing data with customizable services and logging capabilities.