Explore 15 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A reverse engineering framework with a focus on usability and code cleanliness
Belkasoft offers cybersecurity solutions, training, and tools for businesses, law enforcement, and academia.
A collaborative forensic timeline analysis tool for organizing and analyzing data with rich annotations and comments.
A high-performance digital forensics exploitation tool for extracting structured information from various inputs without parsing file system structures.
An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.
dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.
A free, open source collection of tools for forensic artifact and image analysis.
A user-friendly and fast Forensic Analysis tool with features like tagging files and generating preview reports.
A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.
A forensic tool to find hidden processes and TCP/UDP ports by rootkits or other hidden techniques.
A shell script for basic forensic collection of various artefacts from UNIX systems.
Truehunter is a tool designed to detect encrypted containers with a focus on Truecrypt and Veracrypt, utilizing a fast and memory efficient approach.
A software that collects forensic artifacts on systems for forensic investigations.
A toolkit for forensic analysis of network appliances with YARA decoding options and frame extraction capabilities.