An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
-
Updated
Jul 11, 2025 - C++
Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
🕵️♂️ All-in-one OSINT tool for analysing any website
Find secrets with Gitleaks 🔑
Loads environment variables from .env for nodejs projects.
Find, verify, and analyze leaked credentials
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
Infisical is the open-source platform for secrets management, PKI, and SSH access.
🤖 The Modern Port Scanner 🤖
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Daemon to ban hosts that cause multiple authentication errors
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuous monitoring, security assessments & audits, incident response, compliance, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, ENS and more
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Scapy: the Python-based interactive packet manipulation program & library.
Adversary Emulation Framework
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more