Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Cross Platform

Explore 31 curated cybersecurity tools, with 17,221+ visitors searching for solutions

CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Trend Cybertron Logo

AI-powered cybersecurity engine for proactive threat detection and response

0
Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

0
Microsoft SEAL Logo

Microsoft SEAL is an open-source homomorphic encryption library that enables arithmetic computations on encrypted data without decryption, supporting privacy-preserving applications across multiple platforms.

0
stegify Logo

A command line steganography tool that uses LSB technique to hide files within images without visible alteration.

0
Daytripper Logo

A laser tripwire device that automatically hides windows, locks computers, or executes custom scripts when motion is detected within 120cm range.

0
Merlin Logo

A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.

0
Android port of Radamsa Logo

An Android port of the Radamsa fuzzing tool compiled with Android NDK to support Android ABIs for security testing on mobile platforms.

0
Syrup Logo

Syrup is a Go-based SSH honeypot that simulates SSH services with fake shells, session recording, and comprehensive logging to monitor and analyze unauthorized access attempts.

0
DumpsterFire Toolset Logo

A modular, cross-platform framework for creating repeatable, time-delayed security events and scenarios for Blue Team training and Red Team operations.

0
PowerGRR Logo

PowerGRR is a PowerShell API client library that automates GRR (Google Rapid Response) operations for digital forensics and incident response across multiple operating systems.

0
Havoc Logo

Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.

0
cwe_checker Logo

A static analysis tool that detects Common Weakness Enumerations (CWEs) in ELF binaries across multiple CPU architectures using Ghidra-based disassembly and various analysis techniques.

0
BleachBit Logo

BleachBit is an open-source system cleaning utility that removes temporary files and system artifacts to free disk space and protect user privacy.

0
Passpie Logo

A command-line password manager that encrypts credentials using GnuPG and stores them in YAML files with git synchronization support.

0
minikube Logo

minikube is a local Kubernetes cluster management tool that enables developers to run and test Kubernetes applications on their local machines across multiple operating systems.

0
jpeginfo Logo

A command-line tool that extracts detailed technical information, metadata, and checksums from JPEG image files with support for multiple output formats.

0
Strelka Logo

Strelka is a real-time, container-based file scanning system that performs file extraction and metadata collection at enterprise scale for threat hunting, detection, and incident response.

0
EvilClippy Logo

EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.

0
python-evtx Logo

A pure Python parser for Windows Event Log (.evtx) files that enables cross-platform forensic analysis of Windows system events.

0
yunginnanet HellPot Logo

Cross-platform HTTP honeypot that traps bots with infinite data streams

0
Honeyntp Logo

Honeyntp is an NTP honeypot and logging tool that captures NTP packets into a Redis database to detect DDoS attacks and monitor network time protocol traffic.

0
Pupy Logo

Pupy is an open-source, cross-platform C2 framework that provides remote access and control capabilities for compromised systems across Windows, Linux, OSX, and Android platforms.

0
OpenCanary Logo

OpenCanary is a multi-protocol network honeypot with low resource requirements and alerting capabilities.

0
CHIPSEC Logo

CHIPSEC is a cross-platform framework for analyzing PC platform security, including hardware, BIOS/UEFI firmware, and low-level system components.

0