Home / Search

Search Tools

Showing 11256 tools • Searched in 3ms

Yomi
Free

Yomi View Yomi

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

YLS Language Server for YARA Language
Free

YLS Language Server for YARA Language View YLS Language Server for YARA Language

A security-focused general purpose memory allocator providing the malloc API with hardening against heap corruption vulnerabilities.

Zeek Agent
Free

Zeek Agent View Zeek Agent

AhnLab PLUS is a unified security platform providing comprehensive cybersecurity solutions for businesses.

ysoserial.net
Free

ysoserial.net View ysoserial.net

A minimal library to generate YARA rules from JAVA with maven support.

Zeek Analysis Tools (ZAT)
Free

Zeek Analysis Tools (ZAT) View Zeek Analysis Tools (ZAT)

Python tool for monitoring user-select APIs in Android apps using Frida.

zeek2es.py
Free

zeek2es.py View zeek2es.py

SysmonSearch makes event log analysis more effective by aggregating Microsoft Sysmon logs and providing detailed analysis through Elasticsearch and Kibana.

Zero Day Initiative Published Advisories
Free

Zero Day Initiative Published Advisories View Zero Day Initiative Published Advisories

A free and open-source tool for identifying vulnerabilities in Joomla-based websites.

ZAP The Zed Attack Proxy
Free

ZAP The Zed Attack Proxy View ZAP The Zed Attack Proxy

Dynamic Java code instrumentation kit for Android applications.

Zenduty
Free

Zenduty View Zenduty

A library to access and parse Windows Shortcut File (LNK) format.

Zentral
Free

Zentral View Zentral

Graylog offers advanced log management and SIEM capabilities to enhance security and compliance across various industries.

ZeroFox EASM
Free

ZeroFox EASM View ZeroFox EASM

A dark web monitoring platform that scans dark and deep web sources to detect exposed organizational data, compromised credentials, domain spoofing, and supply chain threats.

Zero Online Banking
Free

Zero Online Banking View Zero Online Banking

Online cybersecurity conference with speakers' talks and interactive Q&A sessions.

Zircolite
Free

Zircolite View Zircolite

Open source security data lake for AWS with real-time log normalization and Detection-as-Code capabilities.

Zoho Vault
Free

Zoho Vault View Zoho Vault

Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.

Zeus AWS Auditing & Hardening Tool
Free

Zeus AWS Auditing & Hardening Tool View Zeus AWS Auditing & Hardening Tool

A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies

ZeusCloud
Free

ZeusCloud View ZeusCloud

Show the history and changes between configuration versions of AWS resources

zsteg
Free

zsteg View zsteg

A command line tool for transparently hiding files within images using LSB steganography.

ZoomEye
Free

ZoomEye View ZoomEye

A summary of the threat modeling posts and final thoughts on the process

Zui
Free

Zui View Zui

A PHP library for secure data encryption with easy-to-use API.

AI Web Scraping
Free

AI Web Scraping View AI Web Scraping

By using an AI web scraping tool, you can turn any webpage into clean JSON or Markdown just by giving a simple prompt. No need to clean the data yourself. Just drop in the URL, and it gives you exactly what you need. No extra setup, no getting blocked.

RH
Free

Ransomware Help View Ransomware Help

Ransomware Help is the ransomware recovery company to call when every second counts. Our ransomware recovery services, data recovery services, and cybersecurity consulting services work together to protect your systems and restore your data. We offer ransomware decrypt services to handle attacks from strains like LockBit, Phobos, and BlackCat. If your files are locked and your business is on hold, we step in fast with proven solutions and clear communication every step of the way. You’ll also get ongoing cybersecurity help to close security gaps and reduce future risks. With 24/7 support and a 99% success rate, let us help you recover today.

Red Hand Analyzer
Free

Red Hand Analyzer View Red Hand Analyzer

Red Hand Analyzer runs your PCAP file through an automated behavior analysis model to identify network patterns commonly associated with malicious hacker techniques, often missed by signature-based detection engines.

E
Free

EasyHunting View EasyHunting

A professional platform that simplifies penetration testing by providing a unified dashboard for managing targets, automating scans, integrating diverse tools, and delivering AI-powered insights.