Loading...
Explore 113 curated cybersecurity tools, with 14,275 visitors searching for solutions
Docker-based SSO solution with SaaS license mgmt and identity lifecycle integration
Docker-based SSO solution with SaaS license mgmt and identity lifecycle integration
AI-powered identity management platform with Docker container framework
AI-powered identity management platform with Docker container framework
All-in-one offensive security platform for attack surface mgmt & risk scoring
All-in-one offensive security platform for attack surface mgmt & risk scoring
Open source Suricata-based NDR system with threat detection and analysis
Open source Suricata-based NDR system with threat detection and analysis
ML-powered data discovery tool for identifying and classifying sensitive data
ML-powered data discovery tool for identifying and classifying sensitive data
Container security scanner for Docker images with vulnerability detection
Container security scanner for Docker images with vulnerability detection
Container & Kubernetes vulnerability scanning with automated remediation
Container & Kubernetes vulnerability scanning with automated remediation
Fast disassembler producing reassemblable assembly code using Datalog
Fast disassembler producing reassemblable assembly code using Datalog
Container image scanning tool for Kubernetes & Docker with CVE detection
Container image scanning tool for Kubernetes & Docker with CVE detection
Container image scanning & runtime security for containerized applications
Container image scanning & runtime security for containerized applications
Scans repositories for exposed secrets, API keys, and credentials for bug bounty
Scans repositories for exposed secrets, API keys, and credentials for bug bounty
Container security platform scanning images, enforcing K8s policies & runtime threats
Container security platform scanning images, enforcing K8s policies & runtime threats
A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.
A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.
A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.
A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.
Node.js Goof is a vulnerable Node.js demo application containing multiple security vulnerabilities for testing and educational purposes.
Node.js Goof is a vulnerable Node.js demo application containing multiple security vulnerabilities for testing and educational purposes.
A Docker-based penetration testing toolkit that provides a portable environment with GUI support and pre-installed security tools for web application testing and CTF activities.
A Docker-based penetration testing toolkit that provides a portable environment with GUI support and pre-installed security tools for web application testing and CTF activities.
A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.
A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.
Retraced is an audit logging solution that provides compliant, searchable audit trails for applications with client libraries for Go and JavaScript.
Retraced is an audit logging solution that provides compliant, searchable audit trails for applications with client libraries for Go and JavaScript.
A cloud-focused attack simulation framework that provides granular, self-contained offensive techniques mapped to MITRE ATT&CK for red team exercises.
A cloud-focused attack simulation framework that provides granular, self-contained offensive techniques mapped to MITRE ATT&CK for red team exercises.
A Docker-based utility that monitors TLS certificate expiration dates and exposes the data as Prometheus metrics with support for Kubernetes ingress discovery and configurable domain filtering.
A Docker-based utility that monitors TLS certificate expiration dates and exposes the data as Prometheus metrics with support for Kubernetes ingress discovery and configurable domain filtering.
An educational repository providing structured lab materials and scripts for learning container technologies and their internal mechanisms.
An educational repository providing structured lab materials and scripts for learning container technologies and their internal mechanisms.
YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.
YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.
Policy Sentry is an automated IAM policy generator that helps developers create least privilege AWS IAM policies through a template-based workflow.
Policy Sentry is an automated IAM policy generator that helps developers create least privilege AWS IAM policies through a template-based workflow.
A configurable DNS honeypot with SQLite logging and Docker support.
A configurable DNS honeypot with SQLite logging and Docker support.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure