GitHub

Hottest cybersecurity open-source tools of the month: August 2025

Hottest cybersecurity open-source tools of the month: August 2025 2025-08-27 at 08:02 By Sinisa Markovic This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Buttercup: Open-source AI-driven system detects and patches vulnerabilities Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source […]

React to this headline:

Loading spinner

Hottest cybersecurity open-source tools of the month: August 2025 Read More »

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux 2025-08-25 at 08:21 By Help Net Security Kopia is an open-source backup and restore tool that lets you create encrypted snapshots of your files and store them in cloud storage, on a remote server, on network-attached storage, or on your own computer. It doesn’t create a

React to this headline:

Loading spinner

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux Read More »

LudusHound: Open-source tool brings BloodHound data to life

LudusHound: Open-source tool brings BloodHound data to life 2025-08-20 at 08:31 By Mirko Zorz LudusHound is an open-source tool that takes BloodHound data and uses it to set up a working Ludus Range for safe testing. It creates a copy of an Active Directory environment using previously gathered BloodHound data. Red teams can use this

React to this headline:

Loading spinner

LudusHound: Open-source tool brings BloodHound data to life Read More »

Buttercup: Open-source AI-driven system detects and patches vulnerabilities

Buttercup: Open-source AI-driven system detects and patches vulnerabilities 2025-08-18 at 09:42 By Help Net Security Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software. Developed by Trail of Bits, it recently earned second place in DARPA’s AI Cyber Challenge (AIxCC). Main components Buttercup is made up of four main

React to this headline:

Loading spinner

Buttercup: Open-source AI-driven system detects and patches vulnerabilities Read More »

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers 2025-08-15 at 08:34 By Help Net Security Obot MCP Gateway is a free, open-source gateway that enables IT organizations to securely manage and scale adoption of Model Context Protocol (MCP) servers. MCPs are becoming the standard for how AI agents interface with

React to this headline:

Loading spinner

Obot MCP Gateway: Open-source platform to securely manage the adoption of MCP servers Read More »

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations 2025-08-12 at 08:01 By Help Net Security EntraGoat is a purpose-built tool that sets up a vulnerable Microsoft Entra ID environment to mimic real-world identity security issues. It’s designed to help security professionals practice spotting and exploiting common misconfigurations. The tool creates a range

React to this headline:

Loading spinner

EntraGoat: Vulnerable Microsoft Entra ID infrastructure to simulate identity security misconfigurations Read More »

Concentric AI enhances data security with new platform integrations

Concentric AI enhances data security with new platform integrations 2025-08-06 at 09:44 By Industry News Concentric AI announced new integrations that enhance the AI-driven capabilities of its Semantic Intelligence data security governance platform, expanding data governance functionality for organizations. Concentric AI’s new integration with Wiz, gives Wiz customers unique contextual insights into their cloud data

React to this headline:

Loading spinner

Concentric AI enhances data security with new platform integrations Read More »

BloodHound 8.0 debuts with major upgrades in attack path management

BloodHound 8.0 debuts with major upgrades in attack path management 2025-08-05 at 10:11 By Help Net Security SpecterOps has released BloodHound 8.0, the latest iteration of its open-source attack path management platform, featuring major enhancements and expanded capabilities. BloodHound OpenGraph The release introduces BloodHound OpenGraph, a major advancement in identity attack path management that uncovers

React to this headline:

Loading spinner

BloodHound 8.0 debuts with major upgrades in attack path management Read More »

Open-source password recovery utility Hashcat 7.0.0 released

Open-source password recovery utility Hashcat 7.0.0 released 2025-08-04 at 08:10 By Anamarija Pogorelec Hashcat is an open-source password recovery tool that supports five attack modes and more than 300 highly optimized hashing algorithms. It runs on CPUs, GPUs, and other hardware accelerators across Linux, Windows, and macOS, and includes features for distributed password cracking at

React to this headline:

Loading spinner

Open-source password recovery utility Hashcat 7.0.0 released Read More »

Artemis: Open-source modular vulnerability scanner

Artemis: Open-source modular vulnerability scanner 2025-07-30 at 09:00 By Mirko Zorz Artemis is an open-source modular vulnerability scanner that checks different aspects of a website’s security and translates the results into easy-to-understand messages that can be shared with the organizations being scanned. “The most important feature of the tool is report generation. Besides scanning, it

React to this headline:

Loading spinner

Artemis: Open-source modular vulnerability scanner Read More »

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities 2025-07-28 at 08:13 By Mirko Zorz Vulnhuntr is an open-source tool that finds remotely exploitable vulnerabilities. It uses LLMs and static code analysis to trace how data moves through an application, from user input to server output. This helps it spot complex, multi-step vulnerabilities that traditional tools

React to this headline:

Loading spinner

Vulnhuntr: Open-source tool to identify remotely exploitable vulnerabilities Read More »

Autoswagger: Open-source tool to expose hidden API authorization flaws

Autoswagger: Open-source tool to expose hidden API authorization flaws 2025-07-24 at 11:57 By Help Net Security Autoswagger is a free, open-source tool that scans OpenAPI-documented APIs for broken authorization vulnerabilities. These flaws are still common, even at large enterprises with mature security teams, and are especially dangerous because they can be exploited with little technical

React to this headline:

Loading spinner

Autoswagger: Open-source tool to expose hidden API authorization flaws Read More »

Cervantes: Open-source, collaborative platform for pentesters and red teams

Cervantes: Open-source, collaborative platform for pentesters and red teams 2025-07-23 at 08:31 By Mirko Zorz Cervantes is an open-source collaborative platform built for pentesters and red teams. It offers a centralized workspace to manage projects, clients, vulnerabilities, and reports, all in one place. By streamlining data organization and team coordination, it helps reduce the time

React to this headline:

Loading spinner

Cervantes: Open-source, collaborative platform for pentesters and red teams Read More »

Calico: Open-source solution for Kubernetes networking, security, and observability

Calico: Open-source solution for Kubernetes networking, security, and observability 2025-07-21 at 08:12 By Mirko Zorz Calico is an open-source unified platform that brings together networking, security, and observability for Kubernetes, whether you’re running in the cloud, on-premises, or at the edge. The solution uses the lowest amount of processing resources, which is especially important in

React to this headline:

Loading spinner

Calico: Open-source solution for Kubernetes networking, security, and observability Read More »

Falco: Open-source cloud-native runtime security tool for Linux

Falco: Open-source cloud-native runtime security tool for Linux 2025-07-16 at 07:46 By Help Net Security Falco is an open-source runtime security tool for Linux systems, built for cloud-native environments. It monitors the system in real time to spot unusual activity and possible security threats. Falco is a graduated project from the Cloud Native Computing Foundation

React to this headline:

Loading spinner

Falco: Open-source cloud-native runtime security tool for Linux Read More »

pqcscan: Open-source post-quantum cryptography scanner

pqcscan: Open-source post-quantum cryptography scanner 2025-07-14 at 09:04 By Mirko Zorz pqcscan is an open-source tool that lets users scan SSH and TLS servers to see which Post-Quantum Cryptography (PQC) algorithms they claim to support. It saves the results in JSON files. You can turn one or more of these files into an HTML report

React to this headline:

Loading spinner

pqcscan: Open-source post-quantum cryptography scanner Read More »

Kanvas: Open-source incident response case management tool

Kanvas: Open-source incident response case management tool 2025-07-09 at 07:31 By Mirko Zorz Kanvas is an open-source incident response case management tool with a simple desktop interface, built in Python. It gives investigators a place to work with SOD (Spreadsheet of Doom) or similar files, so they can handle key tasks without jumping between different

React to this headline:

Loading spinner

Kanvas: Open-source incident response case management tool Read More »

Aegis Authenticator: Free, open-source 2FA app for Android

Aegis Authenticator: Free, open-source 2FA app for Android 2025-07-07 at 08:34 By Help Net Security Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The app features strong encryption and the ability to back up your data. It supports both HOTP and TOTP, so it

React to this headline:

Loading spinner

Aegis Authenticator: Free, open-source 2FA app for Android Read More »

Google open-sources privacy tech for age verification

Google open-sources privacy tech for age verification 2025-07-03 at 18:47 By Sinisa Markovic Age verification is becoming more common across websites and online services. But many current methods require users to share personal data, like a full ID or birthdate, which raises privacy and security concerns. In response, Google has open-sourced a cryptographic solution that

React to this headline:

Loading spinner

Google open-sources privacy tech for age verification Read More »

GitPhish: Open-source GitHub device code flow security assessment tool

GitPhish: Open-source GitHub device code flow security assessment tool 2025-07-03 at 09:30 By Help Net Security GitPhish is an open-source security research tool built to replicate GitHub’s device code authentication flow. It features three core operating modes: an authentication server, automated landing page deployment, and an administrative management interface. GitPhish can be accessed via a

React to this headline:

Loading spinner

GitPhish: Open-source GitHub device code flow security assessment tool Read More »

Scroll to Top