Explore 27 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.
Microsoft SEAL is a homomorphic encryption library that allows computations on encrypted data without decryption, supporting integer and approximate real number arithmetic.
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
A PHP library for secure data encryption with easy-to-use API.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
A deep dive into the Ledger connect-kit compromise decryption process.
Showcasing bad cryptography and discussing flawed crypto design.
Clevis is a pluggable framework for automated decryption.
Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.
A set of 48 practical programming exercises in cryptography and application security
A tool for xor analysis to guess key length and key based on most frequent characters.
A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.
A web application designed to be 'Xtremely Vulnerable' for security enthusiasts to learn application security.
A comprehensive guide for implementing best practices in cybersecurity across various systems.
Introductory book about cryptography with instructions for building and translating.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Themis provides strong, usable cryptography for busy people.
A tool for breaking crypto and identifying weak cryptosystems, with a humorous name and a separate library called Cryptanalib.
A Capture The Flag (CTF) platform for testing computer security skills
Interactive challenges demonstrating attacks on real-world cryptography.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.
A comprehensive server cryptographic protocol analyzer with API and CLI interface.
Curated list of acronyms and terms related to cyber security landscape with explanations beyond buzzwords.
Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.
Validate baseline cybersecurity skills with CompTIA Security+ certification.