Home / Search

Search Tools

Showing 11256 tools • Searched in 3ms

TestDisk and PhotoRec
Free

TestDisk and PhotoRec View TestDisk and PhotoRec

Microsoft BitLocker is a full volume encryption feature in Windows for protecting data on lost or stolen devices, with tools and resources for implementation.

The Absurdly Underestimated Dangers of CSV Injection
Free

The Absurdly Underestimated Dangers of CSV Injection View The Absurdly Underestimated Dangers of CSV Injection

A tool for enumerating and attacking GitHub Actions pipelines

tfsec to Trivy Migration
Free

tfsec to Trivy Migration View tfsec to Trivy Migration

Threat intelligence and digital risk protection platform

The Anatomy of a Malicious Package
Free

The Anatomy of a Malicious Package View The Anatomy of a Malicious Package

A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.

The Cyber Wire Pro
Free

The Cyber Wire Pro View The Cyber Wire Pro

A leading technology media brand providing news, analysis, and opinion on IT leadership and digital transformation.

The Hacker News
Free

The Hacker News View The Hacker News

PCMag's Security Watch offers timely insights and reviews on security software and technologies.

The Security Ledger
Free

The Security Ledger View The Security Ledger

Graham Cluley offers expert cybersecurity insights and commentary through various media including podcasts and speaking engagements.

The Matasano Crypto Challenges
Free

The Matasano Crypto Challenges View The Matasano Crypto Challenges

FlowDroid is a context-, flow-, field-, object-sensitive and lifecycle-aware static taint analysis tool for Android applications.

The Penetration Testing Execution Standard
Free

The Penetration Testing Execution Standard View The Penetration Testing Execution Standard

A quick and dirty dynamic redirect.rules generator for penetration testers and security professionals.

The Cyberclopaedia
Free

The Cyberclopaedia View The Cyberclopaedia

Enhance the security and privacy of Apple silicon Mac computers with incremental changes and user capability.

The CyberWire
Free

The CyberWire View The CyberWire

A leading technology media brand providing news, analysis, and opinion on IT leadership and digital transformation.

The DFIR Report
Free

The DFIR Report View The DFIR Report

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

The Pyramid of Pain
Free

The Pyramid of Pain View The Pyramid of Pain

Yara rule generator using VirusTotal code similarity feature code-similar-to.

The Practice of Network Security Monitoring
Free

The Practice of Network Security Monitoring View The Practice of Network Security Monitoring

Guidance on mitigating side-channel attacks, firmware vulnerabilities, and UEFI hardening.

The Practical Linux Hardening Guide
Free

The Practical Linux Hardening Guide View The Practical Linux Hardening Guide

A comprehensive guide to Python 3 syntax, features, and resources in a single image.

The SOC Academy (VirusTotal)
Free

The SOC Academy (VirusTotal) View The SOC Academy (VirusTotal)

Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

The Sleuth Kit & Autopsy
Free

The Sleuth Kit & Autopsy View The Sleuth Kit & Autopsy

A Python-based engine for automatic creation of timelines in digital forensic analysis

The State of Security by Tripwire
Free

The State of Security by Tripwire View The State of Security by Tripwire

OWASP offers essential resources and community support to enhance application security.

TheHive Documentation
Free

TheHive Documentation View TheHive Documentation

Automate security incident handling and facilitate real-time activities of incident handlers.

The Sleuth Kit (TSK) & Autopsy
Free

The Sleuth Kit (TSK) & Autopsy View The Sleuth Kit (TSK) & Autopsy

A library to access and manipulate RAW image files.

The Update Framework (TUF)
Free

The Update Framework (TUF) View The Update Framework (TUF)

Goof is a vulnerable Node.js demo application that includes a series of vulnerabilities and exploits

The Threat Hunter Playbook
Free

The Threat Hunter Playbook View The Threat Hunter Playbook

yarAnalyzer creates statistics on a yara rule set and files in a sample directory, generating tables and CSV files, including an inventory feature.

Themis
Free

Themis View Themis

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

TheHive Project
Free

TheHive Project View TheHive Project

A Sysmon configuration file template with detailed explanations and tutorial-like features.