An in-depth looking into Cryptography
A website with information regarding Ciphers, Hashes, and Crypt analysis.
Simon Singh's cryptography website
AVCaesar is a malware analysis engine and repository. Your suspicious files can be analysed by a set of antivirus.
A forum for reverse engineering, OS internals and malware analysis
A free Malware repository providing researchers access to samples, malicious feeds, and Yara results.
VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code.
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public. https://thezoo.morirt.com
The Ultimate Security Vulnerability Datasource
The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP).
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software.
From this site, you will find information about both existing SCAP specifications and emerging specifications relevant to NIST's security automation agenda.
Check if you have an account that has been compromised in a data breach
Aircrack-ng is a complete suite of tools to assess WiFi network security.
Toolkit for investigating web security
Windows-only password recovery tool handles an enormous variety of tasks
Colasoft Packet Builder enables creating custom network packets.
CurrPorts is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local computer.
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable
Securities and Exchange Commission Edgar Database
Ettercap is a comprehensive suite for man in the middle attacks.
Exploit DB- Google Hacking/ Google Dorking Database
A fast and easy-to-use calculator that allows to compute message digests, checksums and HMACs for files, as well as for text and hex strings
Hirens BootCD, Darik's Boot and Nuke (DBAN), etc
hping is a command-line oriented TCP/IP packet assembler/analyzer.
Domain Name Registration Data Lookup
A Disassembler and Debugger
Whats your IP and DNS?
John the Ripper is a fast password cracker, currently available for many flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS
Download Kali Linux Images
Password Auditing and Cracking
Set of tools for interacting with Malshare
An open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.
Network monitoring solution
Medusa Parallel Network Login Auditor
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing
Netcat (often abbreviated to nc) is a computer networking utility for reading and writing from and to network connections using Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accurate online researches.
Ophcrack is a free Windows password cracker based on rainbow tables.
RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. It crack hashes with rainbow tables.
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
The SIFT Workstation is a group of free open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings.
MAC Address Spoofing Tool
Search engine for Internet-connected devices
TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on your system, including the local and remote addresses and state of TCP connections.
This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system.
VMware Workstation Player is free for personal non-commercial use
VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use.
Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community.
Website Change Detection, Monitoring, and Alerts
Packet capture and network protocol analyzer.
A Tool For Mass Password Auditing of Windows Systems
P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way.
The web application Bruteforcer
Our mission is to: Encourage diversity and support women who want to pursue careers in information security, Promote diverse and supportive workplaces, and help change workplace cultures.
WiCyS offers mentoring, learning, networking and career development to women at all stages of their cybersecurity careers.
Advancing Women to Lead the Future of Privacy and Security