Loading...
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to accelerate sales and compliance
Feature your product and reach thousands of professionals.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
Open Backup Extractor is an open source program for extracting data from iPhone and iPad backups.
Open Backup Extractor is an open source program for extracting data from iPhone and iPad backups.
Certbot is a free tool for automatically enabling HTTPS on websites using Let's Encrypt certificates.
Certbot is a free tool for automatically enabling HTTPS on websites using Let's Encrypt certificates.
Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.
Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.
On-demand access to AWS and ISV compliance reports with time-saving benefits.
On-demand access to AWS and ISV compliance reports with time-saving benefits.
Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.
Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.
Automated and flexible approach for deploying Windows 10 with security standards set by the DoD.
Automated and flexible approach for deploying Windows 10 with security standards set by the DoD.
JSON.parse() drop-in replacement with prototype poisoning protection.
JSON.parse() drop-in replacement with prototype poisoning protection.
LinkLiar is a status menu app for spoofing MAC addresses to enhance privacy on MacBook.
LinkLiar is a status menu app for spoofing MAC addresses to enhance privacy on MacBook.
Avira Free Security is an all-in-one security, privacy, and performance app for Mac, providing real-time protection, password management, VPN, and more, all for free.
Avira Free Security is an all-in-one security, privacy, and performance app for Mac, providing real-time protection, password management, VPN, and more, all for free.
A project exploring minimal set of restrictions for running untrusted code using Linux containers in a concise codebase.
A project exploring minimal set of restrictions for running untrusted code using Linux containers in a concise codebase.
A file search and query tool for ops and security experts.
A file search and query tool for ops and security experts.
Comprehensive guide for Iptables configuration and firewall rules.
Microsoft Azure service for safeguarding cryptographic keys and secrets.
Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.
Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.
StackStorm is an open-source automation platform that connects and automates DevOps workflows and integrates with existing infrastructure.
StackStorm is an open-source automation platform that connects and automates DevOps workflows and integrates with existing infrastructure.
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
A list of Windows privilege escalation techniques, categorized and explained in detail.
A list of Windows privilege escalation techniques, categorized and explained in detail.
AWS Web Application Firewall (WAF) for protecting web applications from common exploits.
AWS Web Application Firewall (WAF) for protecting web applications from common exploits.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.
Cilium is a networking, observability, and security solution with an eBPF-based dataplane.
Cilium is a networking, observability, and security solution with an eBPF-based dataplane.
A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.
A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.
Get the latest cybersecurity updates in your inbox
Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.
Weekly cybersecurity newsletter for security leaders and professionals