Find the right solution for your security needs without any cost.Explore 2631 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Tool for hiding data inside data and manipulating byte sequences.
Tool for hiding data inside data and manipulating byte sequences.
StaDynA is a system supporting security app analysis in the presence of dynamic code update features.
StaDynA is a system supporting security app analysis in the presence of dynamic code update features.
AWS Shield provides managed DDoS protection for your applications, automatically detecting and mitigating sophisticated network-level DDoS events.
AWS Shield provides managed DDoS protection for your applications, automatically detecting and mitigating sophisticated network-level DDoS events.
A sandbox for quickly sandboxing known or unknown families of Android Malware
A sandbox for quickly sandboxing known or unknown families of Android Malware
MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.
MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.
Gitleaks is a SAST tool for detecting and preventing hardcoded secrets in git repos.
Gitleaks is a SAST tool for detecting and preventing hardcoded secrets in git repos.
A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers
A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers
IDAPython plugin for generating Yara rules/patterns from x86/x86-64 code through parameterization.
IDAPython plugin for generating Yara rules/patterns from x86/x86-64 code through parameterization.
Truehunter is a tool designed to detect encrypted containers with a focus on Truecrypt and Veracrypt, utilizing a fast and memory efficient approach.
Truehunter is a tool designed to detect encrypted containers with a focus on Truecrypt and Veracrypt, utilizing a fast and memory efficient approach.
ICSREF is a modular framework that automates reverse engineering of CODESYS v2 industrial control system binaries through binary analysis and library call identification.
ICSREF is a modular framework that automates reverse engineering of CODESYS v2 industrial control system binaries through binary analysis and library call identification.
A secret keeper that stores secrets in DynamoDB, encrypted at rest.
An advanced Content Disarm and Reconstruction software for enhancing computer safety by removing dynamic content from Office files.
An advanced Content Disarm and Reconstruction software for enhancing computer safety by removing dynamic content from Office files.
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.
DOS attack by sending fake BPDUs to disrupt switches' STP engines.
DOS attack by sending fake BPDUs to disrupt switches' STP engines.
Learn how to integrate security into Agile development teams for high performance
Learn how to integrate security into Agile development teams for high performance
A lookup service for AS-numbers and prefixes by country
Preparation process for participating in the Pacific Rim CCDC 2015.
Preparation process for participating in the Pacific Rim CCDC 2015.
SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.
SANS Institute provides cyber security training, certifications, and degrees to empower cyber security practitioners and teams.
Sysreptor offers a customizable reporting solution for penetration testers and red teamers to streamline their security assessments.
Sysreptor offers a customizable reporting solution for penetration testers and red teamers to streamline their security assessments.
CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.
CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.
Weekly security newsletter with advisories from major software vendors
Weekly security newsletter with advisories from major software vendors
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.
A Live Response collection script for Incident Response that automates the collection of artifacts from various Unix-like operating systems.