Python

Explore 238 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
yaramod Logo

Yaramod is a library for parsing YARA rules into AST and building new YARA rulesets with C++ programming interface.

0
Nuke My LUKS Logo

A network-triggered emergency tool that overwrites LUKS encryption headers with random data to prevent forced decryption in high-risk situations.

0
NoSQLMap Logo

NoSQLMap is an open source Python tool that automates NoSQL injection attacks and exploits configuration weaknesses in NoSQL databases to disclose or clone data.

0
Strelka Logo

Strelka is a real-time, container-based file scanning system that performs file extraction and metadata collection at enterprise scale for threat hunting, detection, and incident response.

0
SHIVA Spampot Logo

SHIVA: Spam Honeypot with Intelligent Virtual Analyzer for capturing and analyzing spam data.

0
CyBot Open Source Threat Intelligence Chat Bot Logo

CyBot is a free and open source threat intelligence chat bot with a community-driven plugin framework.

0
pcapfex Logo

pcapfex is a forensic tool that extracts files from packet capture data by analyzing network traffic and identifying embedded file content.

0
ROPgadget Tool Logo

ROPgadget is a cross-platform command-line tool that searches for ROP gadgets in binary files across multiple architectures to facilitate exploit development and ROP chain construction.

0
visualize_logs Logo

A Python library and command line tool that creates interactive visualizations for log data analysis with zoom and navigation capabilities.

0
IPython Notebook Logo

Interactive computational environment for code execution, text, and media combination.

0
OSINT Omnibus Logo

An interactive command line application for Open Source Intelligence collection and artifact management that enables investigation of IP addresses, domains, email addresses, file hashes, and other digital artifacts.

0
Ebowla Logo

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

0
MalPipe Logo

A modular malware collection and processing framework with support for various threat intelligence feeds.

0
uncompyle6 Logo

A native Python cross-version decompiler and fragment decompiler.

0
OCyara Logo

OCyara performs OCR on images and PDF files to extract text content and scan it against Yara rules for malware detection.

0
python-evtx Logo

A pure Python parser for Windows Event Log (.evtx) files that enables cross-platform forensic analysis of Windows system events.

0
Hostintel Logo

Collect various intelligence sources for hosts in CSV format.

0
Acquire Logo

A tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container, aiding in digital forensic triage.

0
OWA Honeypot Logo

A Flask-based honeypot that simulates Outlook Web App (OWA) environments to attract and analyze malicious activities targeting OWA systems.

0
AWS IR Logo

AWS IR is a Python command line utility for automated incident response and mitigation of instance and key compromises in Amazon Web Services environments.

0
Confused Logo

A dependency security scanner that identifies potential supply chain vulnerabilities by checking for available package namespace registrations across Python, JavaScript, PHP, and Maven repositories.

0
SILENTTRINITY Logo

SILENTTRINITY is a Python-based, asynchronous C2 framework that uses .NET scripting languages for post-exploitation activities without relying on PowerShell.

0
PhoneyC Logo

PhoneyC is a client-side honeypot that emulates vulnerable web browsers to detect and analyze malicious web content and browser-based exploits.

0
protobuf-inspector Logo

A command-line tool that parses Google Protobuf encoded data without schema definitions and displays the content in a readable, colored format.

0