Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
npm security team foils plot to steal $13 million in cryptocurrency
npm security team foils plot to steal $13 million in cryptocurrency
Tool for exploiting Sixnet RTUs to gain root level access with little effort.
Tool for exploiting Sixnet RTUs to gain root level access with little effort.
ELAT (Event Log Analysis Tool) is a tool that helps in analyzing Windows event logs for malware detection.
ELAT (Event Log Analysis Tool) is a tool that helps in analyzing Windows event logs for malware detection.
A payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems.
A payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems.
A set of tools for fingerprinting and exploiting Amazon cloud infrastructures
A set of tools for fingerprinting and exploiting Amazon cloud infrastructures
Centrally Manage Cloud Firewall Rules with AWS Firewall Manager
Centrally Manage Cloud Firewall Rules with AWS Firewall Manager
A featured networking utility for reading and writing data across network connections with advanced capabilities.
A featured networking utility for reading and writing data across network connections with advanced capabilities.
A repository providing guidance on mitigating hardware and firmware security vulnerabilities including side-channel attacks, UEFI hardening, and microcode vulnerabilities.
A repository providing guidance on mitigating hardware and firmware security vulnerabilities including side-channel attacks, UEFI hardening, and microcode vulnerabilities.
Repository for apps to be used in Shuffle with compatibility instructions.
Repository for apps to be used in Shuffle with compatibility instructions.
Firejail is a SUID sandbox program for restricting the running environment of untrusted applications on Linux.
Firejail is a SUID sandbox program for restricting the running environment of untrusted applications on Linux.
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
OWASP offers essential resources and community support to enhance application security.
OWASP offers essential resources and community support to enhance application security.
Dnscan is a DNS reconnaissance tool that performs DNS scans, DNS cache snooping, and DNS amplification attack detection.
Dnscan is a DNS reconnaissance tool that performs DNS scans, DNS cache snooping, and DNS amplification attack detection.
Mandos Way provides strategic cybersecurity insights, particularly in AI implementation and leadership.
Mandos Way provides strategic cybersecurity insights, particularly in AI implementation and leadership.
An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.
An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.
A structured approach to managing and responding to suspected security events or incidents.
A structured approach to managing and responding to suspected security events or incidents.
nudge4j is a tool to control Java applications from the browser and experiment with live code.
nudge4j is a tool to control Java applications from the browser and experiment with live code.
A tool for detecting capabilities in executable files, providing insights into a program's behavior and potential malicious activities.
A tool for detecting capabilities in executable files, providing insights into a program's behavior and potential malicious activities.
A comprehensive cheat sheet for accessing Windows systems from Linux hosts using smbclient and rpcclient tools, covering password management, user and group enumeration, and more.
Sample security playbooks for security automation, orchestration and response (SOAR) using Microsoft Sentinel trigger
Sample security playbooks for security automation, orchestration and response (SOAR) using Microsoft Sentinel trigger
A library to access and manipulate RAW image files.
Management portal for LoKi scanner with centralized database for scanning activities.
Management portal for LoKi scanner with centralized database for scanning activities.