Discover the highest-rated tools and resources on CybersecTools.Explore 100 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
A collection of CTF write-ups demonstrating the use of pwntools for solving binary exploitation challenges across various cybersecurity competitions.
A collection of CTF write-ups demonstrating the use of pwntools for solving binary exploitation challenges across various cybersecurity competitions.
IT certification training for CompTIA exams with free resources.
IT certification training for CompTIA exams with free resources.
The best security training environment for Developers and AppSec Professionals.
SecLists is a comprehensive repository of security testing lists including usernames, passwords, URLs, fuzzing payloads, and web shells used during penetration testing and security assessments.
SecLists is a comprehensive repository of security testing lists including usernames, passwords, URLs, fuzzing payloads, and web shells used during penetration testing and security assessments.
Stay up-to-date on the latest trends and developments in AWS Cloud Security with this weekly digest newsletter.
Stay up-to-date on the latest trends and developments in AWS Cloud Security with this weekly digest newsletter.
Cortex XDR is a comprehensive endpoint security solution that blocks advanced attacks with behavioral threat protection, AI, and cloud-based analysis, and provides complete endpoint security and lightning-fast investigation and response.
Cortex XDR is a comprehensive endpoint security solution that blocks advanced attacks with behavioral threat protection, AI, and cloud-based analysis, and provides complete endpoint security and lightning-fast investigation and response.
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.
HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.
A fast web crawler for discovering endpoints and assets within web applications during security reconnaissance.
A fast web crawler for discovering endpoints and assets within web applications during security reconnaissance.
Validate baseline cybersecurity skills with CompTIA Security+ certification.
Validate baseline cybersecurity skills with CompTIA Security+ certification.
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
A login cracker that can be used to crack many types of authentication protocols.
A login cracker that can be used to crack many types of authentication protocols.
ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.
ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.
An evolving how-to guide for securing a Linux server with detailed steps and explanations.
An evolving how-to guide for securing a Linux server with detailed steps and explanations.
A community website for API security news, vulnerabilities, and best practices
A community website for API security news, vulnerabilities, and best practices
Learn about 'Admin Free' Active Directory and the significance of privileged groups in AD.
Learn about 'Admin Free' Active Directory and the significance of privileged groups in AD.
A project developed for pentesters to practice SQL Injection concepts in a controlled environment.
A project developed for pentesters to practice SQL Injection concepts in a controlled environment.
A powerful tool that enables organizations to discover, manage, and secure privileged access, helping to reduce the risks associated with privileged accounts and activities.
A powerful tool that enables organizations to discover, manage, and secure privileged access, helping to reduce the risks associated with privileged accounts and activities.
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.
A knowledge base of analytics developed by MITRE based on the MITRE ATT&CK adversary model.