Open Source

Explore 252 curated cybersecurity tools, with 15,336 visitors searching for solutions

libolecf Logo

A library for accessing and parsing OLE 2 Compound File (OLECF) format files, including Microsoft Office documents and thumbs.db files.

0
CTF Write-ups 2013 Logo

A community-maintained archive of CTF write-ups and source files from cybersecurity competitions held in 2013.

0
n6 (Network Security Incident eXchange) Logo

n6 is a network security incident exchange system that collects, manages, and distributes threat and incident data through REST API and web interfaces for authorized users.

0
bounty-targets-data Logo

A repository providing hourly-updated data dumps of bug bounty platform scopes from major platforms like HackerOne, Bugcrowd, and Intigriti for security researchers.

0
BleachBit Logo

BleachBit is an open-source system cleaning utility that removes temporary files and system artifacts to free disk space and protect user privacy.

0
BusKill App Logo

A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.

0
OSTrICa Logo

OSTrICa is an open source plugin-based framework that collects and visualizes threat intelligence data from various sources to help cybersecurity professionals correlate IoCs and enhance their defensive capabilities.

0
nyx Threat Intelligence artifact distribution Logo

nyx is a threat intelligence artifact distribution system that facilitates the sharing of threat intelligence indicators from various sources to defensive security systems with configurable criticality levels.

0
Themis Logo

Themis is an open-source cryptographic services library that provides high-level encryption and data protection capabilities for securing data during authentication, storage, messaging, and network exchange.

0
InvisibilityCloak Logo

InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.

0
Darkarmour Logo

Darkarmour is an open-source Windows antivirus evasion framework that enables security professionals to bypass antivirus detection through customizable obfuscation and anti-analysis techniques.

0
Monkey-Spider Logo

A crawler-based low-interaction client honeypot for exposing website threats.

0
minikube Logo

minikube is a local Kubernetes cluster management tool that enables developers to run and test Kubernetes applications on their local machines across multiple operating systems.

0
Boomerang Decompiler Logo

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

0
SOARCA Logo

SOARCA is an open-source SOAR platform that automates security incident response workflows using standardized CACAOv2 playbooks and multiple integration interfaces.

0
AfterGlow Cloud Logo

AfterGlow Cloud is a Django-based web application that allows users to upload data and generate graph visualizations through a browser interface.

0
ChopShop Logo

ChopShop is a MITRE framework that helps analysts create pynids-based decoders and detectors for identifying APT tradecraft in network traffic.

0
SharpC2 Logo

SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.

0
The Threat Hunter Playbook Logo

A community-driven open source project providing interactive notebooks with detection logic, adversary tradecraft, and resources organized according to MITRE ATT&CK framework for threat hunting and detection development.

0
Starbase Logo

Starbase is a graph-based security analysis platform that provides automated asset discovery and relationship mapping across external services and systems to enhance attack surface visibility.

0
Snap7 Homepage Logo

Website providing information on Snap7 open-source communication library.

0
ssh-audit by jtesta Logo

ssh-audit is a Python-based tool for auditing SSH server and client configurations to identify security weaknesses and ensure compliance with best practices.

0
Bitwarden Logo

Secure and manage passwords across devices with Bitwarden's open-source, encrypted password manager.

0
YETI Logo

YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange.

0