Explore 9 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
Ericsson Enterprise Wireless Solutions provides secure wireless connectivity for businesses through private 5G networks, enterprise coverage solutions, and cloud-managed WWAN infrastructure with integrated zero trust security.
Ericsson Enterprise Wireless Solutions provides secure wireless connectivity for businesses through private 5G networks, enterprise coverage solutions, and cloud-managed WWAN infrastructure with integrated zero trust security.
InternalBlue is a Bluetooth experimentation framework that enables low-level firmware interaction with Broadcom chips for security research and attack prototype development.
InternalBlue is a Bluetooth experimentation framework that enables low-level firmware interaction with Broadcom chips for security research and attack prototype development.
A laser tripwire device that automatically hides windows, locks computers, or executes custom scripts when motion is detected within 120cm range.
A laser tripwire device that automatically hides windows, locks computers, or executes custom scripts when motion is detected within 120cm range.
A suite of tools for Wi-Fi network security assessment and penetration testing.
A suite of tools for Wi-Fi network security assessment and penetration testing.
GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
A Java-based Bluetooth honeypot that captures and analyzes malware and attacks targeting Bluetooth-enabled devices.
A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.
A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.
Cybersecurity industry portal offering articles, tools, and resources.
A powerful and extensible framework for reconnaissance and attacking various networks and devices.
A powerful and extensible framework for reconnaissance and attacking various networks and devices.