Security Tools
Explore our collection of 214 tools for cybersecurity professionals and enthusiasts curated by the members and executives of MQCyberSec.
Filter by Subcategory
Aperi'Solve
Online platform that performs multiple automated steganography analysis tools on uploaded images to reveal hidden data.
AutoVolatility
Script to run multiple Volatility plugins simultaneously, streamlining memory forensics analysis by automating common ta...
Awesome-Unicode
A curated list of delightful Unicode tidbits, packages, and resources that can be used for security and development purp...
AWS Exposable Resources
List of AWS resources that can be publicly exposed or shared with untrusted accounts, focusing on resource policies, sha...
BlockchainSQL
Tool that allows querying blockchain wallets and transactions using SQL-like syntax for cryptocurrency investigations an...
CellMapper
Crowd-sourced cellular coverage mapping service that collects and displays data on cell tower locations and signal cover...
Ciphey
Automated decryption tool using artificial intelligence to decipher encrypted text, excelling in various ciphers and enc...
Coppersmith
Implementation of Coppersmith's algorithm for finding small roots of polynomial equations, useful in attacking cryptogra...
crt.sh
Certificate Transparency search tool that allows searching and monitoring SSL/TLS certificates for domains.
Crypto-attacks
Framework containing implementations of various cryptographic attacks, providing tools for breaking cryptographic scheme...
Cryptographic-Attacks
Collection of various cryptographic attacks, focusing on implementations and theoretical vulnerabilities in cryptographi...
CSP Evaluator
Tool by Google that helps developers and security experts analyze Content Security Policies for security vulnerabilities...
CTF-Crypto
Collection of cryptographic challenges and solutions from Capture The Flag (CTF) competitions, covering a wide range of ...
DNSDumpster
Free domain research tool that discovers hosts related to a domain through DNS records, finding subdomains and related d...
Dogbolt
Online decompiler explorer that compares the output of various decompilers against the same binary to aid in reverse eng...
ECC Attacks
Repository of known attacks on Elliptic Curve Cryptography (ECC), covering ECDH and ECDSA vulnerabilities, with explanat...
EditThisCookie2
Browser extension for managing, editing, and exporting browser cookies; useful for web development, testing, and securit...
FactorDB
Online database for integer factorization that stores known factorizations of numbers and provides an interface for fact...
Gadget Inspector
Inspects Java libraries and classpaths for gadget chains used to construct exploits for deserialization vulnerabilities.
hlextend
Python library to exploit hash length extension attacks against various hashing algorithms like SHA-1, SHA-256, and MD5.
Hurricane Electric BGP Toolkit
BGP routing and network intelligence tool providing information about autonomous systems, IP addresses, and network rela...
JWT.io
Online tool for decoding, verifying, and generating JSON Web Tokens (JWTs); enables secure inspection and debugging of J...
LLM Security
Resources and guidance on security risks and vulnerabilities related to Large Language Models (LLMs) and AI applications...
LMFDB
Comprehensive database of mathematical objects related to L-functions, modular forms, and related number theory objects,...
Maigret
Tool for collecting a dossier on a person by username only, retrieving accounts from a large number of sites.
MemProcFS
Memory analysis toolkit exposing physical memory as a filesystem, enabling live memory forensics, extraction, and analys...
Minicom
Text-based serial port communications program for interfacing with embedded systems, routers, and other hardware devices...
Netcat
Versatile command-line utility for reading and writing data across network connections using TCP or UDP; widely used for...
PHPGGC
PHP Gadget Chains Generator for exploiting unserialize vulnerabilities in PHP applications with various popular framewor...
PwnFox
Firefox extension designed for penetration testers, providing features like traffic coloring, multi-proxy support, and w...
rbndr.us DNS rebinding service
This page will help to generate a hostname for use with testing for dns rebinding vulnerabilities in software.
Revshells
Online Reverse Shell generator with Local Storage functionality, URI & Base64 Encoding, MSFVenom Generator, and Raw Mode...
sandwich
This is a simple Ruby script to generate UUIDs based on a range of timestamps in order to perform a Sandwich Attack.
SecLists
Collection of multiple types of lists used during security assessments, including usernames, passwords, URLs, sensitive ...
SharpDPAPI
C# implementation of DPAPI (Data Protection API) functionality, allowing for decryption of secrets protected by DPAPI.
Tomcat-webshell-application
A webshell application and interactive shell for pentesting Apache Tomcat servers.
TShark
Command-line network protocol analyzer, part of the Wireshark suite, for capturing and analyzing network traffic in real...
Uber-APK-Signer
Tool to sign and align single APKs or multiple APKs (ApkBundles, xAPKs, split APKs) with Uber's method.
Unicode Confusables
Official Unicode tool for identifying confusable characters and homoglyphs that could be used in spoofing attacks or phi...
USB-Mouse-Pcap-Visualizer
Tool to visualize USB mouse data captured in PCAP files, aiding in analysis of mouse movements and potential input injec...
Wappalyzer
Browser extension and online service that uncovers technologies used on websites, including CMS, eCommerce platforms, we...
Webhook.site
Online service for capturing, inspecting, and testing webhooks and HTTP requests; provides a unique URL to receive and d...
WESNG
Windows Exploit Suggester - Next Generation. A tool for finding potential missing patches based on the output of systemi...
XSS Cheat Sheet
Comprehensive collection of cross-site scripting (XSS) attack vectors, filter evasion techniques, and testing methodolog...
No tools found matching your filters.
Try adjusting your search terms, tags, or filters.