Security Tools

Investigation & Threat Intelligence

VirusTotal

  • What it does: Scans files, URLs, IPs, and domains using multiple security engines.
  • Who it’s for: Security analysts, researchers, and advanced users.
  • Practical use case: Check a suspicious attachment or file before opening it.

URLScan.io

  • What it does: Analyzes websites and displays detailed technical behavior such as scripts and network activity.
  • Who it’s for: Phishing investigators and security teams.
  • Practical use case: Safely inspect suspicious links.

Shodan

  • What it does: Scans files, URLs, IPs, and domains using multiple security engines.
  • Who it’s for: Security analysts, researchers, and advanced users.
  • Practical use case: Check a suspicious attachment or file before opening it.

AbuseIPDB

  • What it does: Checks whether an IP address has been reported for malicious activity.
  • What it does: Checks whether an IP address has been reported for malicious activity.
  • Practical use case: Verify suspicious login attempts or network traffic.

Breach & Identity Protection

Have I Been Pwned

  • What it does: Checks if an email or password has been exposed in known data breaches.
  • Who it’s for: Individuals and IT administrators.
  • Who it’s for: Individuals and IT administrators.

Malware Analysis

ANY.RUN

  • What it does: Interactive sandbox environment for safely analyzing suspicious files.
  • Who it’s for: Malware analysts and SOC teams.
  • Practical use case: Upload suspicious files to observe their behavior.

Hybrid Analysis

  • What it does: Automated malware analysis platform that provides detailed behavioral reports.
  • Who it’s for: Security researchers and analysts.
  • Practical use case: Submit suspicious files to review their behavior.

Breach & Identity Protection

Have I Been Pwned

  • What it does: Checks if an email or password has been exposed in known data breaches.
  • Who it’s for: Individuals and IT administrators.
  • Who it’s for: Individuals and IT administrators.

Malware Analysis

ANY.RUN

  • What it does: Interactive sandbox environment for safely analyzing suspicious files.
  • Who it’s for: Malware analysts and SOC teams.
  • Practical use case: Upload suspicious files to observe their behavior.

Hybrid Analysis

  • What it does: Automated malware analysis platform that provides detailed behavioral reports.
  • Who it’s for: Security researchers and analysts.
  • Practical use case: Submit suspicious files to review their behavior.

Privacy & Data Protectione

VeraCrypt

  • What it does: Encrypts files and entire storage drives to protect sensitive data.
  • Who it’s for: Individuals and professionals.
  • Practical use case: Protect important files if a device is lost or stolen.

Signal

  • What it does: Provides end-to-end encrypted messaging and secure calls.
  • Who it’s for: Individuals and teams.
  • Practical use case: Send sensitive information securely.

Tor Browser

  • What it does: Allows anonymous web browsing through the Tor network.
  • What it does: Allows anonymous web browsing through the Tor network.
  • Practical use case: Browse anonymously to protect identity and location.
VirusTotal


  • What it does: Scans files, URLs, IPs, and domains using multiple security engines.
  • Who it’s for: Security analysts, researchers, and advanced users.
  • Practical use case: Check a suspicious attachment or file before opening it.
  • What it does: Analyzes websites and displays detailed technical behavior such as scripts and network activity.
  • Who it’s for: Phishing investigators and security teams.
  • Practical use case: Safely inspect suspicious links.
  • What it does: Scans files, URLs, IPs, and domains using multiple security engines.
  • Who it’s for: Security analysts, researchers, and advanced users.
  • Practical use case: Check a suspicious attachment or file before opening it.
  • What it does: Checks whether an IP address has been reported for malicious activity.
  • What it does: Checks whether an IP address has been reported for malicious activity.
  • Practical use case: Verify suspicious login attempts or network traffic.
Have I Been Pwned


  • What it does: Checks if an email or password has been exposed in known data breaches.
  • Who it’s for: Individuals and IT administrators.
  • Who it’s for: Individuals and IT administrators.
ANY.RUN


  • What it does: Interactive sandbox environment for safely analyzing suspicious files.
  • Who it’s for: Malware analysts and SOC teams.
  • Practical use case: Upload suspicious files to observe their behavior.
  • What it does: Automated malware analysis platform that provides detailed behavioral reports.
  • Who it’s for: Security researchers and analysts.
  • Practical use case: Submit suspicious files to review their behavior.
VeraCrypt


  • What it does: Encrypts files and entire storage drives to protect sensitive data.
  • Who it’s for: Individuals and professionals.
  • Practical use case: Protect important files if a device is lost or stolen.
  • What it does: Provides end-to-end encrypted messaging and secure calls.
  • Who it’s for: Individuals and teams.
  • Practical use case: Send sensitive information securely.
  • What it does: Allows anonymous web browsing through the Tor network.
  • What it does: Allows anonymous web browsing through the Tor network.
  • Practical use case: Browse anonymously to protect identity and location.
VirusTotal


  • What it does: Scans files, URLs, IPs, and domains using multiple security engines.
  • Who it’s for: Security analysts, researchers, and advanced users.
  • Practical use case: Check a suspicious attachment or file before opening it.
  • What it does: Analyzes websites and displays detailed technical behavior such as scripts and network activity.
  • Who it’s for: Phishing investigators and security teams.
  • Practical use case: Safely inspect suspicious links.
  • What it does: Scans files, URLs, IPs, and domains using multiple security engines.
  • Who it’s for: Security analysts, researchers, and advanced users.
  • Practical use case: Check a suspicious attachment or file before opening it.
  • What it does: Checks whether an IP address has been reported for malicious activity.
  • What it does: Checks whether an IP address has been reported for malicious activity.
  • Practical use case: Verify suspicious login attempts or network traffic.
  • What it does: Scans files, URLs, IPs, and domains using multiple security engines.
  • Who it’s for: Security analysts, researchers, and advanced users.
  • Practical use case: Check a suspicious attachment or file before opening it.
  • What it does: Analyzes websites and displays detailed technical behavior such as scripts and network activity.
  • Who it’s for: Phishing investigators and security teams.
  • Practical use case: Safely inspect suspicious links.
  • What it does: Scans files, URLs, IPs, and domains using multiple security engines.
  • Who it’s for: Security analysts, researchers, and advanced users.
  • Practical use case: Check a suspicious attachment or file before opening it.
  • What it does: Checks whether an IP address has been reported for malicious activity.
  • What it does: Checks whether an IP address has been reported for malicious activity.
  • Practical use case: Verify suspicious login attempts or network traffic.
Have I Been Pwned


  • What it does: Checks if an email or password has been exposed in known data breaches.
  • Who it’s for: Individuals and IT administrators.
  • Who it’s for: Individuals and IT administrators.
  • What it does: Checks if an email or password has been exposed in known data breaches.
  • Who it’s for: Individuals and IT administrators.
  • Who it’s for: Individuals and IT administrators.
ANY.RUN


  • What it does: Interactive sandbox environment for safely analyzing suspicious files.
  • Who it’s for: Malware analysts and SOC teams.
  • Practical use case: Upload suspicious files to observe their behavior.
  • What it does: Automated malware analysis platform that provides detailed behavioral reports.
  • Who it’s for: Security researchers and analysts.
  • Practical use case: Submit suspicious files to review their behavior.
  • What it does: Interactive sandbox environment for safely analyzing suspicious files.
  • Who it’s for: Malware analysts and SOC teams.
  • Practical use case: Upload suspicious files to observe their behavior.
  • What it does: Automated malware analysis platform that provides detailed behavioral reports.
  • Who it’s for: Security researchers and analysts.
  • Practical use case: Submit suspicious files to review their behavior.
VeraCrypt


  • What it does: Encrypts files and entire storage drives to protect sensitive data.
  • Who it’s for: Individuals and professionals.
  • Practical use case: Protect important files if a device is lost or stolen.
  • What it does: Provides end-to-end encrypted messaging and secure calls.
  • Who it’s for: Individuals and teams.
  • Practical use case: Send sensitive information securely.
  • What it does: Allows anonymous web browsing through the Tor network.
  • What it does: Allows anonymous web browsing through the Tor network.
  • Practical use case: Browse anonymously to protect identity and location.
  • What it does: Encrypts files and entire storage drives to protect sensitive data.
  • Who it’s for: Individuals and professionals.
  • Practical use case: Protect important files if a device is lost or stolen.
  • What it does: Provides end-to-end encrypted messaging and secure calls.
  • Who it’s for: Individuals and teams.
  • Practical use case: Send sensitive information securely.
  • What it does: Allows anonymous web browsing through the Tor network.
  • What it does: Allows anonymous web browsing through the Tor network.
  • Practical use case: Browse anonymously to protect identity and location.
Scroll to Top