logo

Cyber Security Tools (46)

Welcome to our curated list of cybersecurity tools! Here, you'll find a comprehensive collection of tools to help you protect your digital assets, detect and respond to cyber threats, and ensure the security of your network. From firewalls to vulnerability scanners, our list covers a wide range of tools to suit your specific cybersecurity needs. With so many different tools to choose from, you're sure to find one that fits your requirements.
TOCCATA
TOCCATA
Item
Description
Link
Hunter
Search for email addresses belonging to a website.
IntelligenceX
Search Tor, I2P, data leaks, domains, and emails.
Fofa
Search for various threat intelligence.
AlienVault
Extensive threat intelligence feed.
URLScanner.io
free service to scan and analyse websites
VulnIQ
Collects, processes and correlates data from various sources.
Pulsedive
Search for threat intelligence.
Grep App
Search across a half million git repos.
GreyNoise
Search for devices connected to the internet.
Inquest Labs
Deep File inspection
GrayHatWarfare
Search public S3 buckets.
URL Scan
Free service to scan and analyse websites.
ZoomEye
Gather information about targets.
Vulners
Search vulnerabilities in a large database.
haveibeenpwned
Check if your email has been compromised in a data breach
https://haveibeenpwned.com/
Censys
Assessing attack surface for internet connected devices.
Packet Storm Security
Browse latest vulnerabilities and exploits.
abuseipdb
Check if an IP address has been reported for abusive behavior
https://www.abuseipdb.com/
SecurityTrails
Extensive DNS data.
Netlas
Search and monitor internet connected assets.
ONYPHE
Collects cyber-threat intelligence data.
Wigle
Database of wireless networks, with statistics.
Uncoder.io
Sigma rule converter for detection rule translation to popular SIEM tool
DeHashed
View leaked credentials.
Binary Edge
Scans the internet for threat intelligence.
Fortiguard Threat Encyclopedia
CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.
Ghidra
Ghidra is a software reverse engineering (SRE) framework
ExploitDB
Archive of various exploits.
URL Haus
collection of URLs that have been identified as distributing malware or engaging in other malicious activities, and can be used to protect against cyber threats by blocking access to these URLs.
BeVigil
search engine for mobile application security
DorkSearch
Really fast Google dorking.
LeakIX
Search publicly indexed information.
WayBackMachine
View content from deleted websites.
PublicWWW
Marketing and affiliate marketing research.
Shodan
Search for devices connected to the internet.
Bayse Intelligence
Scans websites and also pulls out related attack infrastructure
CRT sh
Search for certs that have been logged by CT.
SearchCode
Search 75 billion lines of code from 40 million projects.
virustotal
Analyze suspicious files and URLs for malware
https://www.virustotal.com/gui/home/upload
DNSTwist.it
phishing domain scanner
DNSDumpster
Search for DNS records quickly.
PimEyes
Facial recognition search engine/Reverse image search
PolySwarm
Scan files and URLs for threats.
FullHunt
Search and discovery attack surfaces.
Any Run Malware Trends Tracker
Malware Trends Tracker
Share