Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Security Research

Explore 92 curated cybersecurity tools, with 17,519+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Otseca Logo

Open source security auditing tool to search and dump system configuration.

0
Malware Indicators of Compromise Logo

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

0
Frida Logo

Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.

0
Shotgunyara Logo

A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.

0
Blackhat Conference Presentation Slides Logo

A repository providing centralized access to presentation slides from major cybersecurity conferences including Black Hat, Offensivecon, and REcon events.

0
Android-Reports-and-Resources Logo

A collection of security reports and resources documenting various Android application vulnerabilities including hardcoded credentials, insecure deeplinks, and code execution flaws.

0
Yara Rule Generator Logo

A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.

0
Regexp Security Cheatsheet Logo

A comprehensive repository documenting security vulnerabilities in regular expressions used by Web Application Firewalls, including bypass examples and SAST tools for vulnerability identification.

0
Krakatau Logo

A Java bytecode assembler and disassembler toolkit that converts classfiles to human-readable format and provides decompilation capabilities for reverse engineering Java applications.

0
OWASP Honeypot Logo

An open-source Python software for creating honeypots and honeynets securely.

0
SCADAShutdownTool Logo

An industrial control system testing tool that enables security researchers to enumerate SCADA controllers, read register values, and modify register data across different testing modes.

0
Honeypot-Camera Logo

An observation camera honeypot for proof-of-concept purposes

0
Hybrid-Analysis Logo

Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.

0
cowrie2neo Logo

cowrie2neo parses Cowrie honeypot logs and imports the data into Neo4j databases for graph-based analysis and visualization of honeypot interactions.

0
secrepo Logo

secrepo.com is a curated repository providing access to various cybersecurity datasets including Snort logs, LANL datasets, and other security research data for analysis and testing purposes.

0
MUlliNER.ORG/NET/DE Logo

Personal website of Collin R. Mulliner with a focus on security research and mobile platforms.

0
VERIS Community Database Logo

A publicly available dataset of security incidents designed to support cybersecurity research and threat analysis.

0
Cortex Logo

Cortex is a tool for analyzing observables at scale and automating threat intelligence, digital forensics, and incident response.

0
Cloud Security Research Logo

A collection of free cloud security research articles by Rhino Security Labs covering AWS, Azure, and GCP security topics including best practices, vulnerability assessments, and threat mitigation strategies.

0
Paving The Way to DA - Complete Post (Pt 1,2 & 3) Logo

A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.

0