The quick and simple editor for cron schedule expressions by Cronitor.
The Ultimate Cybersecurity Resource List. A curated directory of cybersecurity tools and resources for infosec professionals.
A resource containing all the tools each ransomware gangs uses.
Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves.
A portable multi-tool for pentesters and geeks in a toy-like body. It loves hacking digital stuff, such as radio protocols, access control systems, hardware, and more. It's fully open-source and customizable, so you can extend it in whatever way you like.
A subdomain finder is a tool used to find the subdomains of a given domain.
This calculator returns a variety of information regarding Internet Protocol version 4 (IPv4) and IPv6 subnets including possible network addresses, usable host ranges, subnet mask, and IP class, among others.
Pentest List is a curation of the latest top-rated tools and content in penetration testing and security defense. Discover cutting-edge tools, blogs, and more, covering port scanning, SQL injection, and a wide range of other vulnerability exploits.
Leading source of security tools, hacking tools, cybersecurity and network security. Learn about new tools and updates in one place.
The web application vulnerabilities index lists vulnerabilities according to its severity and is classified by the compliance standard it falls under.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.
The Most Popular & Fastest Growing Open Source Security Projects on GitHub.