Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Community Driven

Explore 23 curated cybersecurity tools, with 17,221+ visitors searching for solutions

CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Rogueapps Logo

A collaborative repository documenting TTPs and attack patterns associated with malicious OIDC/OAuth 2.0 applications.

0
Sublime Platform Logo

A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.

0
Project Honey Pot Logo

The Web's Largest Community Tracking Online Fraud & Abuse

0
Wigle Logo

WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.

0
MalShare.com Logo

A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.

0
Contribution Guidelines Logo

Standardized contribution guidelines for maintaining quality cybersecurity tool repositories and community-curated lists.

0
Community Security Analytics (CSA) Logo

A community-driven repository of pre-built security analytics queries and rules for monitoring and detecting threats in Google Cloud environments across various log sources and activity types.

0
Forseti Security Logo

An archived community-driven collection of open source cloud security tools that provided monitoring and compliance capabilities for cloud infrastructure.

0
ThreatHunting Project Logo

A community-driven informational repository providing resources and guidance for hunting adversaries in IT environments.

0
abuse.ch Logo

Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.

0
CTF Write-ups 2013 Logo

A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.

0
The Threat Hunter Playbook Logo

A community-driven open source project providing interactive notebooks with detection logic, adversary tradecraft, and resources organized according to MITRE ATT&CK framework for threat hunting and detection development.

0
CTF Write-ups Repository (2014) Logo

A collaborative repository of CTF write-ups and source files from 2014 competitions that allows community contributions to address scattered documentation issues.

0
Open Security Training Logo

Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.

0
CTF Write-ups Repository (2016) Logo

A collaborative repository containing CTF competition write-ups and source files from 2016, providing accessible solutions and educational resources for cybersecurity challenges.

0
Shuffle Automation Logo

Shuffle Automation is an accessible automation platform that provides workflow automation capabilities for security operations with both self-hosted and cloud deployment options.

0
Workflow Templates Repository Logo

A community repository of workflow templates for the Ayehu NG platform that enables automated IT and business process execution.

0
Custom Activities Repository Logo

A community-driven repository and development framework for creating custom automation activities within the Ayehu NG IT orchestration platform.

0
Eramba Logo

A community-driven GRC solution that is simple, affordable, and open-source.

0
secrepo Logo

secrepo.com is a curated repository providing access to various cybersecurity datasets including Snort logs, LANL datasets, and other security research data for analysis and testing purposes.

0
APT Groups and Operations Logo

A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.

0
Viper Framework Logo

Binary analysis and management framework for organizing malware and exploit samples.

0
YARA Public YARA rules Logo

A community-maintained repository of YARA rules for detecting and classifying malware based on patterns and characteristics.

0