Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
An open-source Python software for creating honeypots and honeynets securely.
An open-source Python software for creating honeypots and honeynets securely.
Fast suspicious file finder for threat hunting and live forensics.
Fast suspicious file finder for threat hunting and live forensics.
DroidBox is a tool for dynamic analysis of Android applications, providing insights into package behavior and security.
DroidBox is a tool for dynamic analysis of Android applications, providing insights into package behavior and security.
A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.
A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.
Comprehensive suite of tools and resources by Microsoft Azure for ensuring security and protection of data and applications in the cloud.
Comprehensive suite of tools and resources by Microsoft Azure for ensuring security and protection of data and applications in the cloud.
SSLyze is a fast and powerful SSL/TLS scanning tool and Python library with a focus on speed, reliability, and ease of integration.
SSLyze is a fast and powerful SSL/TLS scanning tool and Python library with a focus on speed, reliability, and ease of integration.
Tool for analyzing Windows Recycle Bin INFO2 file
A multi-platform open source tool for triaging suspect systems and hunting for Indicators of Compromise (IOCs) across thousands of endpoints.
A multi-platform open source tool for triaging suspect systems and hunting for Indicators of Compromise (IOCs) across thousands of endpoints.
A wargaming network for penetration testers to practice their skills in a realistic environment.
A wargaming network for penetration testers to practice their skills in a realistic environment.
A post-exploitation tool for pentesting Active Directory
Passively maps and visually displays ICS/SCADA network topology for network security
Passively maps and visually displays ICS/SCADA network topology for network security
Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.
Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.
Industrial control system automation and testing tool for SCADA security testing.
Industrial control system automation and testing tool for SCADA security testing.
Collection of penetration testing scripts for AWS with a focus on reconnaissance.
Collection of penetration testing scripts for AWS with a focus on reconnaissance.
A web application honeypot sensor attracting malicious traffic from the Internet
Integrates static APK analysis with Yara and requires re-compilation of Yara with the androguard module.
Integrates static APK analysis with Yara and requires re-compilation of Yara with the androguard module.
Standalone graphical utility for viewing Java source codes from ".class" files.
Standalone graphical utility for viewing Java source codes from ".class" files.
Directory containing components to build labs for Chapter 29 with setup instructions and VM information.
Directory containing components to build labs for Chapter 29 with setup instructions and VM information.
A platform for version control and collaboration in software development projects.
A platform for version control and collaboration in software development projects.
Insights on Red Teaming for Pacific Rim CCDC 2016 competition, focusing on preparation, operations plan, and automation.
Insights on Red Teaming for Pacific Rim CCDC 2016 competition, focusing on preparation, operations plan, and automation.
Cybersecurity industry portal offering articles, tools, and resources.
A static analysis tool for Android apps that detects malware and other malicious code
A static analysis tool for Android apps that detects malware and other malicious code
A wireless network detector, sniffer, and intrusion detection system