Security Tool

Explore 59 curated cybersecurity tools, with 15,161 visitors searching for solutions

Binwalk Logo

Binwalk is a firmware analysis tool that enables reverse engineering and extraction of embedded file systems and archives from firmware images.

1
Python IOC Editor v0.9.8 Logo

PyIOCe is a Python-based OpenIOC editor that enables security professionals to create, edit, and manage Indicators of Compromise for threat intelligence and incident response operations.

0
Yara Mode for GNU Emacs Logo

A GNU Emacs editor mode that provides syntax highlighting, indentation, and language server integration for editing YARA rule files.

0
massdns Logo

A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)

0
xortool.py Logo

A Python 3 tool for analyzing XOR-encrypted data that can guess key lengths and decrypt XOR ciphers based on character frequency analysis.

0
ClamAV Logo

ClamAV is an open-source antivirus engine that detects trojans, viruses, malware, and other malicious threats.

0
Shellclear Logo

A command-line tool that secures shell command history by clearing sensitive commands, displaying command summaries, and providing stash functionality for presentations across multiple shell environments.

0
Zircolite Logo

Standalone SIGMA-based detection tool for EVTX, Auditd, Sysmon for Linux, XML or JSONL/NDJSON Logs.

0
PyIntelOwl Logo

PyIntelOwl is a Python SDK and CLI client for interacting with IntelOwl's threat intelligence API to submit files and observables for automated security analysis.

0
ocaml-yara Logo

An OCaml Ctypes wrapper for the YARA matching engine that enables malware identification capabilities in OCaml applications.

0
Log-Killer Logo

Tool for deleting logs on Linux/Windows servers.

0
Binkit Logo

Binkit is a binary analysis tool that merged with DarunGrim and incorporates its analysis algorithms, currently in internal testing before official release.

0
Toms Honey Pot Logo

A honeypot system designed to detect and analyze potential security threats

0
Nessus Cheat Sheet Logo

A comprehensive reference guide covering Nessus vulnerability scanner configuration, management, API usage, and best practices.

0
m9sweeper Logo

Kubernetes security platform with industry standard open source utilities for securing Kubernetes clusters and apps.

0
BusKill App Logo

A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.

0
Passpie Logo

A command-line password manager that encrypts credentials using GnuPG and stores them in YAML files with git synchronization support.

0
Vim Syntax Highlighting for YARA Rules Logo

A Vim syntax-highlighting plugin for YARA rules that supports versions up to v4.3 and provides enhanced code readability for malware analysts.

0
Honeybrid Logo

A hybrid honeypot framework that combines low and high interaction honeypots for network security

0
findmytakeover Logo

A multi-cloud DNS security tool that detects dangling DNS records and potential subdomain takeover vulnerabilities by scanning cloud infrastructure and DNS zones.

0
Smogcloud Logo

A Go-based tool for discovering and inventorying internet-facing AWS assets across single or multiple accounts to help maintain comprehensive cloud attack surface visibility.

0
FIR (Fast Incident Response) Logo

FIR is a Python-based cybersecurity incident management platform designed for CSIRTs, CERTs, and SOCs to create, track, and report security incidents.

0
Keyscope Logo

A key and secret validation workflow tool built in Rust, supporting over 30 providers and exporting to JSON or CSV.

0
Posh-VirusTotal PowerShell Module Logo

A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.

0