A resource containing all the tools each ransomware gangs uses.
Leading source of security tools, hacking tools, cybersecurity and network security. Learn about new tools and updates in one place.
This calculator returns a variety of information regarding Internet Protocol version 4 (IPv4) and IPv6 subnets including possible network addresses, usable host ranges, subnet mask, and IP class, among others.
Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves.
A subdomain finder is a tool used to find the subdomains of a given domain.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.
The quick and simple editor for cron schedule expressions by Cronitor.
The web application vulnerabilities index lists vulnerabilities according to its severity and is classified by the compliance standard it falls under.
Pentest List is a curation of the latest top-rated tools and content in penetration testing and security defense. Discover cutting-edge tools, blogs, and more, covering port scanning, SQL injection, and a wide range of other vulnerability exploits.
The Most Popular & Fastest Growing Open Source Security Projects on GitHub.
The Ultimate Cybersecurity Resource List. A curated directory of cybersecurity tools and resources for infosec professionals.
A portable multi-tool for pentesters and geeks in a toy-like body. It loves hacking digital stuff, such as radio protocols, access control systems, hardware, and more. It's fully open-source and customizable, so you can extend it in whatever way you like.