The most comprehensive directory of cybersecurity tools for security assessment, penetration testing, and risk discovery.
Explore our curated collection of 137+ essential cybersecurity tools, ranging from network security and penetration testing to malware analysis and vulnerability assessment.
Whether you're a security professional, penetration tester, or IT administrator, find the right tools to enhance your security operations, conduct thorough assessments, and protect your digital assets.
Fast subdomains enumeration tool for penetration testers
Open source intrusion prevention system capable of real-time traffic analysis and packet logging
Professional email finder and verifier tool. Find anyone's email address and verify them in bulk. Features include email finder, domain search, and email verification.
Web Application Firewall (WAF) fingerprinting tool to identify and detect web application firewall products
Network protocol analyzer for network troubleshooting and analysis
WordPress vulnerability scanner used to identify security issues in WordPress installations
A comprehensive mobile security testing framework offering static and dynamic analysis, API security testing, and malware analysis.
Enterprise platform for detecting deepfakes and synthetic media across video content.
Full-featured web reconnaissance framework written in Python
Powerful network analysis framework that transforms network traffic into high-level events and entities
Swiss army knife for TCP/IP connections and listening
Collection of cybersecurity tools for red team operations.
Open source intelligence (OSINT) automation tool that integrates with multiple data sources
Enterprise vulnerability management and assessment platform
Wireless network and device detector, sniffer, wardriving tool, and WIDS framework
A generic SIEM rules platform with multi-platform support and community-driven rules for easy conversion between formats.
Vulnerability scanner for comprehensive security assessments
Network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
Advanced service identification and port scanning tool
Specialized tool for detecting AI-generated and synthetic voice content.
Comprehensive digital content verification platform providing content provenance tracking, digital signatures, metadata verification, and chain of custody tracking.
Open source antivirus engine for detecting trojans, viruses, malware & other malicious threats
Tool for detecting and analyzing potential deepfake videos using advanced AI algorithms.
Comprehensive content verification platform offering cross-modal analysis, AI detection algorithms, blockchain verification, and detailed audit trails.
Automated adversary emulation system that performs post-compromise adversarial behavior
Advanced deepfake detection platform featuring video analysis, face manipulation detection, movement analysis, and confidence scoring capabilities.
Professional audio authentication software featuring waveform analysis, digital signature verification, tampering detection, and comprehensive metadata analysis.
An IoT security assessment tool for default credential testing, device discovery, and vulnerability scanning.
Browser Exploitation Framework for penetration testing
Open source threat intelligence aggregation platform
Advanced deepfake video detection platform that helps identify AI-generated video content.
A PowerShell-based Windows security tool for event log analysis, threat hunting automation, and IOC detection.
Tool for identifying and analyzing potentially AI-generated or manipulated images.
Post-exploitation framework that enables you to run PowerShell agents without powershell.exe
Integrated platform for web application security testing
A DevSecOps platform for security orchestration, vulnerability management, metrics reporting, and CI/CD integration.
Feature-full, modular, high-performance Ruby framework aimed towards web application security scanning
World's fastest and most advanced password recovery tool
A Software Composition Analysis platform for software bill of materials (SBOM), component vulnerability analysis, and license compliance.
Man-in-the-middle attack framework used for phishing credentials and session cookies.
An OSINT tool to search for accounts by username in 581 sites. Features include asynchronous execution, highly customizable, and CSV/TXT export.
AI speech detection tool to identify synthetic and AI-generated audio content.
Modern phishing tool with advanced functionality.
Active Directory security tool that uses graph theory to reveal hidden relationships and attack paths
Advanced command-line tool designed to brute force directories and files in webservers
Multi-modal AI detection platform for identifying synthetic images and audio.
Intelligence Framework for analyzing threats in multiple ways from a single API.
Wireless and ethernet security auditing and attack software.
Platform for monitoring threat actor channels and data breaches.
Advanced image metadata analysis tool providing metadata extraction, digital signature verification, image source identification, and manipulation detection features.
Advanced AI text detection tool offering writing style analysis, perplexity scoring, and bulk content scanning capabilities for identifying AI-generated content.
AI image detection and analysis platform for identifying synthetic content.
Open source cloud native security observability platform
Sophisticated audio forensics tool for voice pattern analysis, audio manipulation detection, spectral analysis, and audio source identification.
An automated API security testing platform offering continuous API scanning, zero-day vulnerability detection, and API documentation analysis.
An offensive Google framework focused on OSINT gathering and vulnerability research around Google services and products. Latest v2.0.1 release includes major improvements.
Security tool designed to find common security issues in Python code
Open-source phishing toolkit designed for businesses and penetration testers.
Developer security platform for open source and container security
Container and cloud security platform with runtime protection
Penetration testing framework that makes hacking simple
A comprehensive vulnerability scanner for containers, filesystems, and git repositories, offering fast and accurate scanning with DevOps-friendly integration.
Open source web server scanner that performs comprehensive tests against web servers for multiple items
An advanced mobile security scanner for Android vulnerability scanning, runtime analysis, and SDK security testing.
Framework for performing layer 2 attacks, focused on network protocol analysis
Pattern matching swiss knife for malware researchers and threat hunters
Security auditing tool for Linux/Unix-based systems that performs detailed security scans and compliance checks
Open source network threat detection engine capable of real-time intrusion detection, inline intrusion prevention and network security monitoring
Collaborative platform for InfoSec teams to handle reporting and vulnerability management
An Infrastructure as Code security scanner that scans Terraform, CloudFormation, and Kubernetes manifests with 1000+ built-in policies and custom policy framework support.
Network tool able to send custom TCP/IP packets and display target replies
AI image detection tool specifically designed for identifying AI-generated images.
Fast and flexible network logon cracker which supports numerous protocols
A modern API security scanner supporting GraphQL and REST API testing, authentication testing, rate limiting analysis, and API fuzzing capabilities.
Open Cyber Threat Intelligence Platform that allows organizations to manage their cyber threat intelligence knowledge and observables.
Tool for finding Geolocation of devices using social engineering.
Security tool that mounts automated victim-customized phishing attacks against WiFi clients.
A comprehensive digital image forensics tool offering error level analysis, noise analysis, clone detection, and metadata analysis capabilities for detecting manipulated images and verifying image authenticity.
Tool for testing and promoting user awareness by simulating real-world phishing attacks.
Collection of PowerShell modules used during penetration tests and red team engagements
A cloud-native runtime security tool providing real-time container security monitoring, Kubernetes threat detection, and custom rule engine for behavior detection.
Open source Host-based Intrusion Detection System (HIDS) that performs log analysis, integrity checking, rootkit detection, and more
Open-source penetration testing framework designed for social engineering.
Open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws
Cloud-based IT, security and compliance solutions
Platform for searching, monitoring, and analyzing machine-generated big data via a web-style interface
Multi-modal content analysis platform utilizing machine learning for detecting AI-generated or manipulated media, featuring forensic analysis tools and automated reporting.
Open source phishing framework for penetration testers and security researchers.
Advanced AI-generated content detection platform with trial access.
Discover where your personal data is stored and how to reclaim it
Calculate potential costs associated with data breaches
Assess and improve your organization's data privacy practices
Define and scope your security assessment requirements