Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Security Research

Explore 92 curated cybersecurity tools, with 17,519+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
jwtear Logo

A command-line tool for parsing, creating, and manipulating JWT tokens

0
dref Logo

A DNS rebinding exploitation framework

0
git-dumper Logo

A tool to dump a Git repository from a website

0
Singularity Logo

A DNS rebinding attack framework for security researchers and penetration testers.

0
csprecon Logo

A tool to discover new target domains using Content Security Policy

0
Tugarecon Logo

A subdomain enumeration tool for penetration testers and security researchers.

0
HoneyFS Logo

HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.

0
WayMore Logo

A tool that finds more information about a given URL or domain by querying multiple data sources.

0
ghauri Logo

An advanced cross-platform tool for detecting and exploiting SQL injection security flaws

0
Gato Logo

A tool for enumerating and attacking GitHub Actions pipelines

0
OpenRedireX Logo

A fuzzer for detecting open redirect vulnerabilities

0
Project Honey Pot Logo

The Web's Largest Community Tracking Online Fraud & Abuse

0
GridPot Logo

GridPot is a honeypot framework that combines GridLAB-D, Conpot, and libiec61850 to simulate industrial control systems and detect attacks on power grid infrastructure.

0
Google Play Unofficial Python API Logo

An unofficial Python API that enables programmatic searching, browsing, and downloading of Android apps from Google Play Store.

0
MagSpoof Logo

MagSpoof is a hardware device that emulates magnetic stripe cards using electromagnetic fields for security research and educational purposes.

0
HackSys Extreme Vulnerable Driver (HEVD) Logo

A Windows kernel driver intentionally designed with various vulnerabilities to help security researchers practice kernel exploitation techniques.

0
CapTipper Logo

CapTipper is a python tool to analyze, explore, and revive HTTP malicious traffic.

0
InvalidSign Logo

InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.

0
Intezer Yara Rules Logo

A powerful tool for detecting and identifying malware using a rule-based system.

0
Revoke-Obfuscation v1.0 Logo

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.

0
GadgetProbe Logo

A tool for identifying and analyzing Java serialized objects in network traffic

0
Evilginx2 Logo

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

0
CDI_yara Logo

A collection of YARA rules for public use, built from intelligence profiles and file work.

0
Project Zero iPhone Messaging Tools Logo

A collection of security research tools from Google's Project Zero team for testing and analyzing iPhone messaging systems including SMS, iMessage, and IMAP protocols.

0