โผ Most saved
        
    Cybersecurity
            Free mode
            
                
                    
                
                
        
        
                    100% free
                
                
                    Freemium
                
                
                    Free Trial
                
            Other tools
- 
    
    
    
    9541249Released 2y ago100% Free
- 
    
     Best Tools, Techniques and Tactics for Tracking Down Cyber Criminals.Open22511Released 2y ago100% Free Best Tools, Techniques and Tactics for Tracking Down Cyber Criminals.Open22511Released 2y ago100% Free
- 
    
     Guidance on offensive security and pentesting.Open2241030Released 2y ago100% Free Guidance on offensive security and pentesting.Open2241030Released 2y ago100% Free
- 
    
    
    
    20010805Released 2y ago100% Free
- Spotlight: Guideless (Guides)
- 
    
     Fortifying networks against cyber threats.Open384996Released 2y ago100% Free Fortifying networks against cyber threats.Open384996Released 2y ago100% Free
- 
    
    
    
    3059336Released 2y ago100% Free
- 
    
    
    
    2348594Released 2y ago100% Free
- 
    
    
    
    2688Released 1y ago100% Free
- 
    
     Cybersecurity expertise with a focus on current threat intelligence.Open186817Released 1y ago100% Free Cybersecurity expertise with a focus on current threat intelligence.Open186817Released 1y ago100% Free
- 
    
    
    
    255745Released 1y ago100% Free
- 
    
    
    
    13079Released 1y ago100% Free
- 
    
    
    
    258757Released 2y ago100% Free
- Didn't find the AI you were looking for?
- 
    
    
    
    241655Released 2y ago100% Free
- 
    
    
    
    322623Released 2y ago100% Free
- 
    
    
    
    181633Released 2y ago100% Free
- 
    
    
    
    3666197Released 2y ago100% Free
- 
    
    
    
    3316927Released 2y ago100% Free
- 
    
    
    
    743672Released 2y ago100% Free
- 
    
    
    
    3686897Released 2y ago100% Free
- 
    
    
    
    194519Released 2y ago100% Free
- 
    
     Unearth software vulnerabilities with AI understanding.Open3565Released 2y ago100% Free Unearth software vulnerabilities with AI understanding.Open3565Released 2y ago100% Free
- 
    
    
    
    18557Released 2y ago100% Free
- 
    
     Specialized Cybersecurity Analyst in the NIST Framework.Open2435161Released 2y ago100% Free Specialized Cybersecurity Analyst in the NIST Framework.Open2435161Released 2y ago100% Free
- 
    
     Assists in identifying and mitigating security threats.Open2045328Released 2y ago100% Free Assists in identifying and mitigating security threats.Open2045328Released 2y ago100% Free
- 
    
    
    
    1575585Released 2y ago100% Free
- 
    
     Open48351Released 1y ago100% Free Open48351Released 1y ago100% Free
- 
    
    
    
    337512Released 1y ago100% Free
- 
    
     Open191520Released 2y ago100% Free Open191520Released 2y ago100% Free
- 
    
     Securing WordPress, managing malware cleanup service.Open248531Released 2y ago100% Free Securing WordPress, managing malware cleanup service.Open248531Released 2y ago100% Free
- 
    
    
    
    2595611Released 2y ago100% Free
- 
    
    
    
    2605102Released 2y ago100% Free
- 
    
     Focused writing on cybersecurity, resilience, and global communication.Open160457Released 2y ago100% Free Focused writing on cybersecurity, resilience, and global communication.Open160457Released 2y ago100% Free
- 
    
     A bot providing detailed cybersecurity threat intelligence.Open2724110Released 2y ago100% Free A bot providing detailed cybersecurity threat intelligence.Open2724110Released 2y ago100% Free
- 
    
     I'll help you write cybersecurity requirements!Open1644309Released 2y ago100% Free I'll help you write cybersecurity requirements!Open1644309Released 2y ago100% Free
- 
    
    
    
    1584Released 2y ago100% Free
- 
    
     Cybersecurity assistant for personal safety tips and setups.Open140411Released 2y ago100% Free Cybersecurity assistant for personal safety tips and setups.Open140411Released 2y ago100% Free
- 
    
     Open191468Released 2y ago100% Free Open191468Released 2y ago100% Free
- 
    
    
    
    20843Released 2y ago100% Free
- 
    
     Feed me any input, I'll match it with relevant MITRE ATT&CK techniques and tactics.Open2174723Released 2y ago100% Free Feed me any input, I'll match it with relevant MITRE ATT&CK techniques and tactics.Open2174723Released 2y ago100% Free
- 
    
    
    
    225423Released 2y ago100% Free
- 
    
    
    
    22443,000Released 2y ago100% Free
- 
    
    
    
    6644144Released 2y ago100% Free
- 
    
    Advanced cybersecurity strategy and insight specialistOpen22439Released 1y ago100% Free
- 
    
    
    
    1303Released 1y ago100% Free
- 
    
     Open18434Released 1y ago100% Free Open18434Released 1y ago100% Free
- 
    
     Empowering organizations in enhancing their cybersecurity defenses.Open2203200Released 2y ago100% Free Empowering organizations in enhancing their cybersecurity defenses.Open2203200Released 2y ago100% Free
- 
    
    
    
    242312Released 2y ago100% Free
- 
    
     Serving quick cybersecurity solutions and protective strategies.Open215376Released 2y ago100% Free Serving quick cybersecurity solutions and protective strategies.Open215376Released 2y ago100% Free
- 
    
     Your AI expert in cyber security training.Open14133Released 2y ago100% Free Your AI expert in cyber security training.Open14133Released 2y ago100% Free
- 
    
     Open1753217Released 2y ago100% Free Open1753217Released 2y ago100% Free
- 
    
     A friendly cybersecurity coach offering practical privacy tips.Open107324Released 2y ago100% Free A friendly cybersecurity coach offering practical privacy tips.Open107324Released 2y ago100% Free
- 
    
     Personalized Cybersecurity book and blog recommendationsOpen167326Released 2y ago100% Free Personalized Cybersecurity book and blog recommendationsOpen167326Released 2y ago100% Free
- 
    
    
    
    1983883Released 2y ago100% Free
- 
    
     Open203336Released 2y ago100% Free Open203336Released 2y ago100% Free
- 
    
    
    
    350358Released 2y ago100% Free
- 
    
    
    
    4043101Released 2y ago100% Free
- 
    
    
    
    2313475Released 2y ago100% Free
- 
    
    
    
    123236Released 1y ago100% Free
- 
    
     Expert in Advanced Cyber Threat Analysis with Collaborative ToolsOpen20327Released 2y ago100% Free Expert in Advanced Cyber Threat Analysis with Collaborative ToolsOpen20327Released 2y ago100% Free
- 
    
     Expert in cybersecurity at KingLand, passionate about cryptography.Open20026Released 1y ago100% Free Expert in cybersecurity at KingLand, passionate about cryptography.Open20026Released 1y ago100% Free
- 
    
    Open203248Released 1y ago100% Free
- 
    
    
    
    2612240Released 1y ago100% Free
- 
    
     Open18325Released 2y ago100% Free Open18325Released 2y ago100% Free
- 
    
     Open235213Released 2y ago100% Free Open235213Released 2y ago100% Free
- 
    
    
    
    110224Released 2y ago100% FreeShapor NaghibzadehFeb 17, 2025The original ShaporGPT!
- 
    
    
    
    1392122Released 2y ago100% Free
- 
    
     Generating audit and penetration test specifications.Open2262161Released 2y ago100% Free Generating audit and penetration test specifications.Open2262161Released 2y ago100% Free
- 
    
    
    
    82212Released 2y ago100% Free
- 
    
     Expert in CVEs and cybersecurity vulnerabilities, providing precise information.Open147287Released 2y ago100% Free Expert in CVEs and cybersecurity vulnerabilities, providing precise information.Open147287Released 2y ago100% Free
- 
    
    
    
    140213Released 2y ago100% Free
- 
    
     Open182244Released 2y ago100% Free Open182244Released 2y ago100% Free
- 
    
    
    
    1402937Released 2y ago100% Free
- 
    
     Open2542Released 2y ago100% Free Open2542Released 2y ago100% Free
- 
    
    
    
    1362212Released 2y ago100% Free
- 
    
    
    
    154218Released 2y ago100% Free
- 
    
    
    
    2072116Released 2y ago100% Free
- 
    
     Leading global cybersecurity strategies, managing cyber risks, and overseeing information governance.Open229232Released 1y ago100% Free Leading global cybersecurity strategies, managing cyber risks, and overseeing information governance.Open229232Released 1y ago100% Free
- 
    
    
    
    186229Released 2y ago100% Free
- 
    
    
    
    122210Released 1y ago100% Free
- 
    
    
    
    23927Released 1y ago100% Free
- 
    
     Guide on AI implementation for secure dataOpen13125Released 2y ago100% Free Guide on AI implementation for secure dataOpen13125Released 2y ago100% Free
- 
    
    
    
    24026Released 2y ago100% Free
- 
    
    
    
    9427Released 2y ago100% Free
- 
    
    
    
    912333Released 2y ago100% Free
- 
    
    
    
    162228Released 2y ago100% Free
- 
    
    
    
    3062700Released 2y ago100% Free
- 
    
    
    
    88281Released 2y ago100% Free
- 
    
     Automated cyber threat intelligence by Bob Gourley.Open3232361Released 2y ago100% Free Automated cyber threat intelligence by Bob Gourley.Open3232361Released 2y ago100% Free
- 
    
    
    
    130286Released 2y ago100% Free
- 
    
    
    
    1392482Released 2y ago100% Free
- 
    
     Ace tech interviews with realistic mock sessions and feedback.Open210248Released 2y ago100% Free Ace tech interviews with realistic mock sessions and feedback.Open210248Released 2y ago100% Free
- 
    
     Open94240Released 2y ago100% Free Open94240Released 2y ago100% Free
- 
    
    
    
    2452Released 2y ago100% Free
- 
    
     Open111145Released 2y ago100% Free Open111145Released 2y ago100% Free
- 
    
     Open537124Released 1y ago100% Free Open537124Released 1y ago100% Free
- 
    
    Thorough threat modelling for system design and review.Open3631356Released 1y ago100% Free
- 
    
    
    
    7213Released 1y ago100% Free
- 
    
    
    
    2031129Released 1y ago100% Free
- 
    
    
    
    121194Released 2y ago100% Free
- 
    
     Expert cybersecurity for software development.Open169128Released 2y ago100% Free Expert cybersecurity for software development.Open169128Released 2y ago100% Free
- 
    
     Classify and understand MITRE ATT&CK Framework terms.Open172116Released 2y ago100% Free Classify and understand MITRE ATT&CK Framework terms.Open172116Released 2y ago100% Free
- 
    
    
    
    4361135Released 2y ago100% Free
- 
    
     Open8514Released 2y ago100% Free Open8514Released 2y ago100% Free
- 
    
     Your guide to starting and advancing in cybersecurity careers.Open1741312Released 2y ago100% Free Your guide to starting and advancing in cybersecurity careers.Open1741312Released 2y ago100% Free
- 
    
    
    
    214115Released 2y ago100% Free
- 
    
    
    
    115110Released 2y ago100% Free
- 
    
    
    
    12012Released 2y ago100% Free
- 
    
    
    
    15117Released 2y ago100% Free
- 
    
    
    
    4111227Released 2y ago100% Free
- 
    
    
    
    106163Released 2y ago100% Free
- 
    
    
    
    2061175Released 2y ago100% Free
- 
    
    
    
    233130Released 1y ago100% Free
- 
    
    
    
    153135Released 1y ago100% Free
- 
    
     Guides on E2EE system implementation and security features for password managers.Open14112Released 1y ago100% Free Guides on E2EE system implementation and security features for password managers.Open14112Released 1y ago100% Free
- 
    
     Open1,099117Released 1y ago100% Free Open1,099117Released 1y ago100% Free
- 
    
     Protect yourself with the best free antivirus software.Open2971Released 1y ago100% Free Protect yourself with the best free antivirus software.Open2971Released 1y ago100% Free
- 
    
     Managing and optimizing your cloud resources.Open11416Released 2y ago100% Free Managing and optimizing your cloud resources.Open11416Released 2y ago100% Free
- 
    
    
    
    102172Released 2y ago100% Free
- 
    
    
    
    119122Released 2y ago100% Free
- 
    
     Web3 security auditor for smart contract analysis and report generation.Open145123Released 2y ago100% Free Web3 security auditor for smart contract analysis and report generation.Open145123Released 2y ago100% Free
- 
    
    
    
    76126Released 2y ago100% Free
- 
    
    
    
    721156Released 2y ago100% Free
- 
    
     Master Microsoft's Defender for Endpoint with tailored guidance.Open89154Released 2y ago100% Free Master Microsoft's Defender for Endpoint with tailored guidance.Open89154Released 2y ago100% Free
- 
    
     Cyber incident response assistant for triage and support.Open136131Released 2y ago100% Free Cyber incident response assistant for triage and support.Open136131Released 2y ago100% Free
- 
    
    
    
    469152Released 2y ago100% Free
- 
    
    
    
    200198Released 2y ago100% Free
- 
    
    
    
    136159Released 2y ago100% Free
- 
    
    
    
    1731590Released 2y ago100% Free
- 
    
     Open11063Released 2y ago100% Free Open11063Released 2y ago100% Free
- 
    
     Expert in crafting cybersecurity announcementsOpen819Released 2y ago100% Free Expert in crafting cybersecurity announcementsOpen819Released 2y ago100% Free
- 
    
    
    
    12262Released 2y ago100% Free
- 
    
    
    
    11274Released 2y ago100% Free
- 
    
    
    
    12916Released 2y ago100% Free
- 
    
     Your partner for penetration testing and vulnerability assessment.Open9128Released 2y ago100% Free Your partner for penetration testing and vulnerability assessment.Open9128Released 2y ago100% Free
- 
    
    
    
    8941Released 2y ago100% Free
- 
    
     Delivering daily, sector-specific cybersecurity intelligence.Open143226Released 2y ago100% Free Delivering daily, sector-specific cybersecurity intelligence.Open143226Released 2y ago100% Free
- 
    
    
    
    11317Released 2y ago100% Free
- 
    
     Identifying and mitigating threats for any system.Open102Released 2y ago100% Free Identifying and mitigating threats for any system.Open102Released 2y ago100% Free
- 
    
    
    
    10013Released 2y ago100% Free
- 
    
    
    
    12745Released 2y ago100% Free
- 
    
    
    
    99137Released 2y ago100% Free
- 
    
    
    
    11412Released 2y ago100% Free
- 
    
    Expert in analyzing vulnerabilities with ransomware focus.Open27683Released 1y ago100% Free
- 
    
    
    
    112285Released 1y ago100% Free
- 
    
     Uncomplicated, accessible digital security advisor.Open128Released 1y ago100% Free Uncomplicated, accessible digital security advisor.Open128Released 1y ago100% Free
- 
    
     AI advisor for tech resilience, balancing strategy and technicalityOpen162Released 1y ago100% Free AI advisor for tech resilience, balancing strategy and technicalityOpen162Released 1y ago100% Free
- 
    
     Expert in answering Web3 Privacy and Data Security Law queries.Open19617Released 2y ago100% Free Expert in answering Web3 Privacy and Data Security Law queries.Open19617Released 2y ago100% Free
- 
    
    
    
    10610Released 2y ago100% Free
- 
    
     Advises on managing technology risks to safeguard organization.Open49Released 2y ago100% Free Advises on managing technology risks to safeguard organization.Open49Released 2y ago100% Free
- 
    
    
    
    1234Released 2y ago100% Free
- 
    
     Dual-role AI discussion bot with programming assistance.Open3447Released 2y ago100% Free Dual-role AI discussion bot with programming assistance.Open3447Released 2y ago100% Free
- 
    
    
    
    7935Released 2y ago100% Free
- 
    
    
    
    18713Released 2y ago100% Free
- 
    
    
    
    12555Released 2y ago100% Free
- 
    
    
    
    1136Released 2y ago100% Free
- 
    
    
    
    20573Released 2y ago100% Free
- 
    
    
    
    14419Released 2y ago100% Free
- 
    
    
    
    13515Released 2y ago100% Free
- 
    
    
    
    962Released 2y ago100% Free
Post
        
 Mini tools
Mini tools
 
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
             
            