Latest Updates!Learn More

Free Cybersecurity Tools

Find the right solution for your security needs without any cost.

Explore 2630 curated cybersecurity tools, with 15,400 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

FREE

Invoke-ATTACKAPI [DEPRECATED] Logo

A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.

0
ida_yara Logo

A Python script for scanning data within an IDB using Yara

0
Chrome URL Dumper Logo

Accessing databases stored on a machine by the Chrome browser and dumping URLs found.

0
YARA-Endpoint Logo

YARA-Endpoint is a client-server architecture tool that can be used for endpoint protection and incident response.

0
YaraParser Logo

Python 3 tool for parsing Yara rules with ongoing development.

0
RandomLib Logo

A library for generating random numbers and strings of various strengths, useful in security contexts.

0
cowrie2neo Logo

cowrie2neo parses Cowrie honeypot logs and imports the data into Neo4j databases for graph-based analysis and visualization of honeypot interactions.

0
Apache Metron Logo

Apache Metron is a centralized tool for security monitoring and analysis that integrates various open-source big data technologies.

0
domfind Logo

Python utility for testing the existence of domain names under different TLDs to find malicious subdomains.

0
EQL Analytics Library Logo

A library of event-based analytics written in EQL to detect adversary behaviors identified in MITRE ATT&CK, providing detection rules for the Elastic Stack.

0
MICROS Honeypot Logo

A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.

0
hollows_hunter Logo

A process scanning tool that detects and dumps malicious implants, shellcodes, hooks, and memory patches in running processes.

0
NSBrute Logo

A Python utility that identifies and exploits domains vulnerable to AWS name server takeover attacks by detecting misconfigured DNS settings.

0
LogonTracer Logo

Investigate malicious logons by visualizing and analyzing Windows Active Directory event logs with LogonTracer.

0
libqcow Logo

A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.

0
AutoMacTC Logo

Automated Mac Forensic Triage Collector

0
Yara Rules Project Logo

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

0
NodeJsScan Logo

Static security code scanner (SAST) for Node.js applications with Docker support and integrations with Slack.

0
CSP Auditor Logo

A plugin for viewing, detecting weak configurations, and generating Content Security Policy headers.

0
RetDec Logo

RetDec is an LLVM-based decompiler that converts machine code from various architectures and file formats back into readable C-like source code for reverse engineering and malware analysis.

0
AWS Config Rules Repository Logo

A community repository of custom AWS Config rules for evaluating AWS resource configurations against compliance and security standards.

0
NECOMA Logo

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

0
smali/baksmali Logo

Assembler/disassembler for the dex format used by Dalvik, Android's Java VM implementation.

0
Caido Logo

A lightweight web security auditing toolkit that simplifies security tasks and enhances productivity.

0