Loading...
Browse 40 community driven tools
Crowdsourced security platform for bug bounties, red teaming, and VAPT
Crowdsourced security platform for bug bounties, red teaming, and VAPT
Crowd-sourced honeynet providing real-time threat intelligence and protection
Crowd-sourced honeynet providing real-time threat intelligence and protection
SaaS platform for threat-informed defense using adversary tradecraft analysis
SaaS platform for threat-informed defense using adversary tradecraft analysis
Threat intel platform for discovering cybercrime on encrypted chat networks
Threat intel platform for discovering cybercrime on encrypted chat networks
Secure configuration guidelines for hardening systems against cyber attacks
Secure configuration guidelines for hardening systems against cyber attacks
Vulnerability scanner using templates to scan apps, cloud, and networks
Vulnerability scanner using templates to scan apps, cloud, and networks
Detection ruleset based on Sigma open source community rules
Detection ruleset based on Sigma open source community rules
Threat-informed detection rule platform for behavioral analytics
Threat-informed detection rule platform for behavioral analytics
Network security solution for SMBs with behavioral intrusion detection
Network security solution for SMBs with behavioral intrusion detection
Open source data visualization and monitoring platform for observability
Open source data visualization and monitoring platform for observability
P2P threat intel sharing platform for collaborative defense communities
P2P threat intel sharing platform for collaborative defense communities
Free TPSRM platform for EDU using HECVAT questionnaires to assess vendors
Free TPSRM platform for EDU using HECVAT questionnaires to assess vendors
Community-based email threat protection using collective intelligence
Community-based email threat protection using collective intelligence
Community platform for sharing and creating detection rules with AI
Community platform for sharing and creating detection rules with AI
Open source network security monitoring tool for traffic analysis
Open source network security monitoring tool for traffic analysis
Open-source detection rules for email attacks like BEC, phishing, and malware
Open-source detection rules for email attacks like BEC, phishing, and malware
AI-powered API security testing platform with continuous attack simulation
AI-powered API security testing platform with continuous attack simulation
A collaborative repository documenting TTPs and attack patterns associated with malicious OIDC/OAuth 2.0 applications.
A collaborative repository documenting TTPs and attack patterns associated with malicious OIDC/OAuth 2.0 applications.
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.
The Web's Largest Community Tracking Online Fraud & Abuse
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
Standardized contribution guidelines for maintaining quality cybersecurity tool repositories and community-curated lists.
Standardized contribution guidelines for maintaining quality cybersecurity tool repositories and community-curated lists.
A community-driven repository of pre-built security analytics queries and rules for monitoring and detecting threats in Google Cloud environments across various log sources and activity types.
A community-driven repository of pre-built security analytics queries and rules for monitoring and detecting threats in Google Cloud environments across various log sources and activity types.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance