Security Tools
Explore our collection of 200 tools for cybersecurity professionals and enthusiasts curated by the members and executives of MQCyberSec.
Filter by Subcategory
Aperi'Solve
Online platform that performs multiple automated steganography analysis tools on uploaded images to reveal hidden data.
AutoVolatility
Script to run multiple Volatility plugins simultaneously, streamlining memory forensics analysis by automating common ta...
AWS Exposable Resources
List of AWS resources that can be publicly exposed or shared with untrusted accounts, focusing on resource policies, sha...
BlockchainSQL
Tool that allows querying blockchain wallets and transactions using SQL-like syntax for cryptocurrency investigations an...
Ciphey
Automated decryption tool using artificial intelligence to decipher encrypted text, excelling in various ciphers and enc...
Coppersmith
Implementation of Coppersmith's algorithm for finding small roots of polynomial equations, useful in attacking cryptogra...
crt.sh
Certificate Transparency search tool that allows searching and monitoring SSL/TLS certificates for domains.
Crypto-attacks
Framework containing implementations of various cryptographic attacks, providing tools for breaking cryptographic scheme...
Cryptographic-Attacks
Collection of various cryptographic attacks, focusing on implementations and theoretical vulnerabilities in cryptographi...
CSP Evaluator
Tool by Google that helps developers and security experts analyze Content Security Policies for security vulnerabilities...
CTF-Crypto
Collection of cryptographic challenges and solutions from Capture The Flag (CTF) competitions, covering a wide range of ...
DNSDumpster
Free domain research tool that discovers hosts related to a domain through DNS records, finding subdomains and related d...
Dogbolt
Online decompiler explorer that compares the output of various decompilers against the same binary to aid in reverse eng...
ECC Attacks
Repository of known attacks on Elliptic Curve Cryptography (ECC), covering ECDH and ECDSA vulnerabilities, with explanat...
EditThisCookie2
Browser extension for managing, editing, and exporting browser cookies; useful for web development, testing, and securit...
FactorDB
Online database for integer factorization that stores known factorizations of numbers and provides an interface for fact...
Gadget Inspector
Inspects Java libraries and classpaths for gadget chains used to construct exploits for deserialization vulnerabilities.
Hurricane Electric BGP Toolkit
BGP routing and network intelligence tool providing information about autonomous systems, IP addresses, and network rela...
JWT.io
Online tool for decoding, verifying, and generating JSON Web Tokens (JWTs); enables secure inspection and debugging of J...
LLM Security
Resources and guidance on security risks and vulnerabilities related to Large Language Models (LLMs) and AI applications...
LMFDB
Comprehensive database of mathematical objects related to L-functions, modular forms, and related number theory objects,...
Maigret
Tool for collecting a dossier on a person by username only, retrieving accounts from a large number of sites.
MemProcFS
Memory analysis toolkit exposing physical memory as a filesystem, enabling live memory forensics, extraction, and analys...
Minicom
Text-based serial port communications program for interfacing with embedded systems, routers, and other hardware devices...
Netcat
Versatile command-line utility for reading and writing data across network connections using TCP or UDP; widely used for...
PwnFox
Firefox extension designed for penetration testers, providing features like traffic coloring, multi-proxy support, and w...
SecLists
Collection of multiple types of lists used during security assessments, including usernames, passwords, URLs, sensitive ...
SharpDPAPI
C# implementation of DPAPI (Data Protection API) functionality, allowing for decryption of secrets protected by DPAPI.
TShark
Command-line network protocol analyzer, part of the Wireshark suite, for capturing and analyzing network traffic in real...
Uber-APK-Signer
Tool to sign and align single APKs or multiple APKs (ApkBundles, xAPKs, split APKs) with Uber's method.
USB-Mouse-Pcap-Visualizer
Tool to visualize USB mouse data captured in PCAP files, aiding in analysis of mouse movements and potential input injec...
Wappalyzer
Browser extension and online service that uncovers technologies used on websites, including CMS, eCommerce platforms, we...
Webhook.site
Online service for capturing, inspecting, and testing webhooks and HTTP requests; provides a unique URL to receive and d...
WESNG
Windows Exploit Suggester - Next Generation. A tool for finding potential missing patches based on the output of systemi...
XSS Cheat Sheet
Comprehensive collection of cross-site scripting (XSS) attack vectors, filter evasion techniques, and testing methodolog...
No tools found matching your filters.
Try adjusting your search terms, tags, or filters.