Loading...
Browse 82 security tool tools
Android app for scanning networks to identify security vulnerabilities
A privacy-focused CAPTCHA alternative that protects websites from bot attacks using proof-of-work challenges and AI-based detection while maintaining GDPR compliance.
A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.
A Go-based web crawler that supports multiple protocols and authentication methods for systematic web resource discovery and collection.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
AWS Vault securely stores AWS IAM credentials in the operating system's keystore and generates temporary credentials for development environments.
A Windows security hardening tool that disables potentially dangerous features in Windows 10/11 and common applications to reduce attack surface for individual users.
WordPress honeypot tool running in a Docker container for monitoring access attempts.
Preflight is a Go-based verification tool that helps organizations validate scripts and executables to prevent supply chain attacks by enabling secure self-compilation and trusted distribution methods.
An anti-forensic kill-switch tool for USB ports to shut down the computer immediately in case of unauthorized access.
Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.
A Yara ruleset designed to detect PHP shells and other webserver malware for malware analysis and threat detection.
NodeSecure is a cybersecurity project that provides security monitoring and analysis capabilities specifically designed for Node.js applications.
Hash Extender is a command-line tool that automates length extension attacks against various hashing algorithms including MD5, SHA-1, SHA-256, and others.
A security tool that detects potential Dependency Confusion attack vectors by identifying private package names that are not reserved on public registries.
WordPress plugin to reduce comment spam with a smarter honeypot.
Binwalk is a firmware analysis tool that enables reverse engineering and extraction of embedded file systems and archives from firmware images.
Get strategic cybersecurity insights in your inbox