Common Good Cyber Mapping

Submit a Tool

This database collects information about free cybersecurity tools, services and platforms deployed to make the Internet safer in the public interest. Future work includes data analysis and research efforts.

Submit a Tool
Solution Organisation Cybersecurity Function
Secure Development Practices SAFECode B. Operating
Software Security for Buyers and Government SAFECode B. Operating
Daily threat intelligence feeds Shadowserver Foundation B. Operating
Sinkholing Project Shadowserver Foundation B. Operating
Cybersecurity training for CSIRTs Shadowserver Foundation B. Operating
CyberFlex Global Cyber Alliance B. Operating
Forum of Incident Response and Security Teams FIRST B. Operating
CREST Accelerated Maturity Programme CREST International B. Operating
Tiq-test MLSec Project B. Operating
ThreatTracker Michael Yip B. Operating
Threatcrowd API Jon Heise B. Operating
Threat intel Yelp B. Operating
Tor Browser The Tor Project B. Operating
2FAS 2FAS B. Operating
AIDE Global Cyber Alliance B. Operating
Phishing Activity Trends Report Anti-Phishing Working Group (APWG) B. Operating
Automated Indicator Sharing (AIS) CISA B. Operating
Malicious Domain Suspension (AMDoS) Anti-Phishing Working Group (APWG) C. Naming Numbering and Routing
ATT&CK MITRE B. Operating
eCrime eXchange Anti-Phishing Working Group (APWG) B. Operating
AbuseIPDB Marathon Studios Inc B. Operating
Feodo Tracker Abuse.ch B. Operating
AbuseHelper Clarified Networks B. Operating
Malware Bazaar Abuse.ch B. Operating
AbuseIO AbuseIO B. Operating
AVG AVG B. Operating
Action Fraud National Fraud & Cyber Crime Reporting Centre B. Operating
Digital Security Helpline Access Now B. Operating
Aircrack-ng Aircrack-ng B. Operating
syft Anchore B. Operating
Cyber Threat Alliance Platform Cyber Threat Alliance B. Operating
Grype Anchore B. Operating
SpamAssassin Apache Software Foundation B. Operating
Apache Syncope Apache Software Foundation B. Operating
Avast Mobile Security for Android Avast B. Operating
Counterfit Azure B. Operating
TekDefense-Automater 1aN0rmus B. Operating
BBB Scam Tracker Better Business Bureau B. Operating
BGP Ranking CIRCL B. Operating
BOTVRIJ.EU botvrij.eu B. Operating
Bearded Avenger CSIRT Gadgets, LLC B. Operating
BlueBox svdwi B. Operating
Blueprint for Ransomware Defense Institute for Security & Technology B. Operating
BruteForceBlocker Daniel Gerzo B. Operating
Common Attack Pattern Enumeration and Classification (CAPEC) MITRE B. Operating
Collective Intelligence Framework (CIF) CSIRT GADGETS, LLC B. Operating
CIS-CAT Lite Center for Internet Security (CIS) B. Operating
Warning List NASK B. Operating
Cyber Security Evaluation Tool (CSET) CISA B. Operating
Cybersecurity Toolkit and Resources to Protect Elections CISA B. Operating
CISA CPG Checklist CISA B. Operating
CRITS MITRE Corporation B. Operating
MS-ISAC Security Operations Center (SOC) Center for Internet Security B. Operating
Cacador sroberts B. Operating
CSA Research Cloud Security Alliance B. Operating
Caldera MITRE B. Operating
Cascade MITRE B. Operating
Electiontools.org Center for Tech and Civic Life B. Operating
CertStream CertStream B. Operating
Childline Toolbox Childline B. Operating
OpenDNS Home Cisco B. Operating
ClamAV ClamAV B. Operating
Cloudflare Free SSL certificate Cloudflare B. Operating
Zero Trust Resource Hub Cloud Security Alliance B. Operating
Athenian Project Cloudflare B. Operating
Project Galileo Cloudflare B. Operating
Cobian Backup CobianSoft B. Operating
Coalition Against Stalkerware Coalition Against Stalkerware B. Operating
Combine mlsecproject B. Operating
Comcast Report Abuse Comcast Cable Communications, LLC B. Operating
Media ratings and reviews Common Sense Media B. Operating
Security Planner Consumer Reports B. Operating
Weekly Patch Report Secure The Village B. Operating
CodeSec Contrast Security B. Operating
Cortex The Hive Project B. Operating
Cross Sector Threat Intelligence Sharing Canadian Cyber Threat Exchange (CCTX) B. Operating
CrowdFMS CrowdStrike B. Operating
Cuckoo Sandbox Cuckoo Foundation B. Operating
STIX OASIS Open C. Naming Numbering and Routing
CyberPeace Builders CyberPeace Institute B. Operating
CyberGreen Stats CyberGreen Institute B. Operating
CyberPeace Cafes CyberPeace Institute B. Operating
CyBot cylance B. Operating
CyberPeace Watch CyberPeace Institute B. Operating
Cyber Leader Certification Program Cyber Readiness Institute B. Operating
Cyber Readiness Program Cyber Readiness Institute B. Operating
Cyber Defenders Cyber Defenders B. Operating
CyberSecure My Business National Cybersecurity Alliance B. Operating
Cyber Analytics Repository MITRE B. Operating
Cyber Civil Rights Initiative Cyber Civil Rights Initiative B. Operating
Cyber Threat Intelligence Repository MITRE B. Operating
Cybersecurity Toolkit for Small Business Global Cyber Alliance B. Operating
Cybersecurity KickStart for Nonprofits Sightline Security B. Operating
Cybersecurity Toolkit for Mission-Based Organizations Global Cyber Alliance B. Operating
Cybersecurity Toolkit for Elections Global Cyber Alliance B. Operating
Cybersecurity Toolkit for Individuals Global Cyber Alliance B. Operating
Cybersecurity Toolkit for Journalists Global Cyber Alliance B. Operating
Shadowserver Dashboard Shadowserver Foundation B. Operating
Cyfin NCFTA B. Operating
DMARC Setup Guide & Resources Global Cyber Alliance B. Operating
BGP Lookup dan.me.uk B. Operating
DataPlane.org Dataplane.org B. Operating
Diceware Diceware B. Operating
DigitalSide Threat-Intel DigitalSide Threat Intel B. Operating
Domain Trust Global Cyber Alliance C. Naming Numbering and Routing
DuckDuckGo DuckDuckGo B. Operating
ECrime Labs eCrimeLabs B. Operating
Surveillance Self-Defense Electronic Frontier Foundation (EFF) B. Operating
Enigmail Deutsche Post B. Operating
Red Team Automation Endgame B. Operating
Community IP Threatlists Fastintercept B. Operating
Fenrir Neo23x0 B. Operating
Romance Scam Recovery Group Cybercrime Support Network B. Operating
FireHOL IP Aggregator spacepatcher B. Operating
Forager opensourcesec B. Operating
Cybersecurity Assessment Tool Ford Foundation B. Operating
FraudGuard FraudGuard.io B. Operating
Free Threat Intel Bert-IanP B. Operating
A handbook to modern mobile maintenance Freedom of the Press Foundation B. Operating
LGBTQ Digital Safety Guide GLAAD B. Operating
GOSINT Cisco B. Operating
Responding to Blackmail Games Hotline B. Operating
Gen Pride Seattle Gen Pride Seattle B. Operating
The Get Safe Online Alert system Get Safe Online B. Operating
Digital Security of LGBTQI Aid Workers The Global Interagency Security Forum (GISF) B. Operating
GRF Ransomware Report Global Resilience Federation B. Operating
Google Authenticator Google B. Operating
GoatRider BinaryDefense B. Operating
Operational Resilience Framework (ORF) Global Resilience Federation B. Operating
Google Safe Browsing Google B. Operating
Google ClusterFuzz Google B. Operating
Google OSS-Fuzz Google B. Operating
Greenbone OpenVAS Greenbone B. Operating
GreenSnow Green Snow B. Operating
Hashcat Hashcat B. Operating
Have i been pwned Have I Been Pwned B. Operating
Hippocampe The Hive Project B. Operating
Intel Owl The Honeynet Project B. Operating
HoneyDB Deception Logic, Inc. B. Operating
Hybrid-Analysis Payload Security B. Operating
I-Blocklist I-Blocklist B. Operating
Intrusion Detection Message Exchange Format (IDMEF) Internet Engineering Task Force D. Transporting
Immuniweb Immuniweb B. Operating
IntelMQ European CERTs B. Operating
Internet Crime Complaint Center FBI B. Operating
TALK checklist Internet Watch Foundation B. Operating
The IWF Reporting Portals Internet Watch Foundation B. Operating
My Family’s Digital Toolkit Internet Matters B. Operating
James Brine Threat Intelligence Feeds James Brine B. Operating
KeePass Google B. Operating
KLara Kaspersky B. Operating
KeeWeb Antelle B. Operating
Kali Linux KALI B. Operating
KQL Hunting Queries Detection Rules Bert JanP B. Operating
Keycloak Red Hat B. Operating
Keexybox Project KeexyBox Project B. Operating
Kestrel Threat Hunting Language Open Cybersecurity Alliance B. Operating
LookUp Sai Santhosh B. Operating
Loki Neo23x0 B. Operating
MISP Core Format Internet Engineering Task Force C. Naming Numbering and Routing
MISP CIRCL B. Operating
Machinae Hurricane Labs B. Operating
Malware Attribute Enumeration and Characterization (MAEC™) MITRE C. Naming Numbering and Routing
MISP Workbench CIRCL B. Operating
MSTIC Jupyter and Python Security Tools Microsoft B. Operating
MANTIS Mantis B. Operating
MISP-Taxii-Server CIRCL B. Operating
Malpedia Fraunhofer FKIE B. Operating
Majestic Million Magestic B. Operating
MalPipe Silas Cutler B. Operating
MalShare Project Silas Cutler B. Operating
Malcolm CISA B. Operating
ManaTI stratosphereips B. Operating
Malware Traffic Analysis Malware Traffic Analysis B. Operating
Malware IOC ESET B. Operating
Megatron CERT-SE B. Operating
MineMeld Palo Alto Networks B. Operating
Military & Veteran Program Cybercrime Support Network B. Operating
Mirai Security Mirai tracker B. Operating
C2 Tracker Monty Security B. Operating
NMAP Gordon Lyon B. Operating
N6 CERT Polska B. Operating
No More Ransom Europol B. Operating
Newly-Registered Domain Lists from Stamus Labs Stamus Networks B. Operating
Nyx paulpc B. Operating
OWASP CycloneDX OWASP B. Operating
OWASP Defectdojo OWASP B. Operating
OSTrICa Ptr32Void B. Operating
OWASP SAMM OWASP B. Operating
OWASP Cheat Sheet Series OWASP B. Operating
MetaDefender Access for Community OPSWAT B. Operating
OWASP Application Security Verification Standard (ASVS) OWASP B. Operating
OWASP Mobile Application Security OWASP B. Operating
OWASP Juice Shop OWASP B. Operating
OWASP OWTF OWASP B. Operating
OWASP CSRFGuard OWASP B. Operating
OWASP Amass OWASP B. Operating
OTX LevelBlue B. Operating
OWASP CRS OWASP B. Operating
OWASP Dependency-Check OWASP B. Operating
ZAP Attack Proxy ZAP B. Operating
OWASP Web Security Testing Guide OWASP B. Operating
OWASP Security Knowledge Framework OWASP B. Operating
OWASP ModSecurity Core Rule Set OWASP B. Operating
OWASP Top 10 OWASP B. Operating
OWASP ZAP ZAP Dev Team B. Operating
OSINT Omnibus InQuest B. Operating
OpenPhish Feeds OpenPhish B. Operating
OASIS Open Command and Control (OpenC2) TC OASIS Open B. Operating
OpenSSH OpenBSD Project B. Operating
OpenEDR Xcitium B. Operating
OpenSecurityTraining2 OpenSecurityTraining2 B. Operating
Quad9 Quad9 B. Operating
BruteSpray x90skysn3k B. Operating
OpenPGP OpenPGP B. Operating
Allstar Open Source Security Foundation (OpenSSF) B. Operating
Go Safeweb Google B. Operating
Netfilter The Netfilter webmasters B. Operating
Nikto 2.5 CIRT.net B. Operating
Kismet Kismet B. Operating
OpenSSF Scorecard OpenSSF B. Operating
Atomic Red Team Atomic Red Team B. Operating
Santa Google B. Operating
Suricata Open Information Security Foundation (OISF) B. Operating
Tsunami Security Scanner Google B. Operating
Enterprise Log Search and Archive (ELSA) Martin Holste B. Operating
sqlmap sqlmap B. Operating
Open Source Insights Google B. Operating
timesketch timesketch B. Operating
Open Source Vulnerabilities OSV B. Operating
Openioc-to-stix STIX Project B. Operating
Digital Corps Out in Tech F. Data gathering not associated with any particular function
Ossec Trend Micro B. Operating
Parent Zone Parent Zone B. Operating
PhotoRec CGSecurity B. Operating
PfSense Rubicon Communications, LLC ( Netgate ) B. Operating
Poortego mgeide B. Operating
PrivacyIDEA Privacy IDEA B. Operating
PyIOCe Yahoo B. Operating
QRadio QTek B. Operating
RITA Active Countermeasures B. Operating
Rastrea2r Ismael Valenzuela B. Operating
Ransomware Playbook Cyber Readiness Institute B. Operating
ReversingLabs YARA Rules Reversing Labs B. Operating
Registrar of Last Resort (ROLR) Shadowserver Foundation C. Naming Numbering and Routing
Rutgers Blacklisted IPs Rutgers B. Operating
Routersploit SANS Institute B. Operating
SiLK Carnegie Mellon University B. Operating
Scapy Philippe Biondi B. Operating
Remnux SANS Institute B. Operating
Snort Cisco B. Operating
SCARS Institute Learning The Society of Citizens Against Relationships Scams (SCARS) B. Operating
Safetag Internews B. Operating
SRA TAXII2 Server Security Risk Advisors B. Operating
STIX Shifter Open Cybersecurity Alliance B. Operating
Scumblr Netflix B. Operating
Scam Survival Toolkit Better Business Bureau B. Operating
Check a website Get Safe Online B. Operating
Scam Survivor Healing Scam Survivor Healing B. Operating
Secureworks PhishInSuits Secureworks B. Operating
Vane2 Secureworks B. Operating
Batea Secureworks B. Operating
Secureworks WhiskeySAML Secureworks B. Operating
Secureworks Dalton Secureworks B. Operating
SecurityScorecard IoCs SecurityScorecard B. Operating
Signal Signal B. Operating
Signature-base Neo23x0 B. Operating
Softrace Alexander Bolshakov B. Operating
Splunk Attack Detection Collector Splunk Enterprise B. Operating
Splunk Synthetic Adversarial Log Objects Splunk Enterprise B. Operating
Splunk Attack Range Splunk Enterprise B. Operating
Stixview Sergey Polzunov B. Operating
StoQ PUNCH Cyber Analytics Group B. Operating
Stix-viz MITRE B. Operating
Stop. Think. Connect. campaign STOP.THINK.CONNECT B. Operating
TARDIS Tripwire Inc. B. Operating
Data Detox Kit Data Detox Kit B. Operating
Telegram Telegram B. Operating
TestDisk CGSecurity B. Operating
ThreatExchange Meta B. Operating
ThreatMiner Threatminer B. Operating
Domain Reputation Spamhaus Project B. Operating
Threat Intelligence Hunter abhinav singh B. Operating
Online Safety for LGBTQ+ Young People The Trevor Project B. Operating
ThreatIngestor InQuest B. Operating
ThreatAggregator jpsenior B. Operating
Threatcmd Jon Heise B. Operating
Threatfeeds.io Pulsedive Community B. Operating
TypeDB CTI TypeDB B. Operating
Uber-Common Uber B. Operating
Victim Connect Resource Center National Center for Victims of Crime B. Operating
WOMBAT Project France Télécom B. Operating
Yara Rules Yara Rules Project B. Operating
YETI Yeti B. Operating
Internet Threat Exposure Analysis Zscaler B. Operating
Ransomware Assessment Zscaler B. Operating
TAXII OASIS Open D. Transporting
SSL Blacklist (SSLBL) Abuse.ch B. Operating
URLhaus Abuse.ch B. Operating
ThreatFox Abuse.ch B. Operating
YARAify Abuse.ch B. Operating
Cobian Reflector CobianSoft B. Operating
AI Security Global Resilience Federation B. Operating
Let’s Encrypt Internet Security Research Group (ISRG) B. Operating
MANRS Global Cyber Alliance C. Naming Numbering and Routing
mitmproxy The Honeynet Project B. Operating
DroidBot The Honeynet Project B. Operating
GreedyBear IntelOwl B. Operating
DRAKVUF The Honeynet Project B. Operating
honeyscanner The Honeynet Project B. Operating
thug The Honeynet Project B. Operating
Dionaea The Honeynet Project B. Operating
T-Pot The Honeynet Project B. Operating
TANNER The Honeynet Project B. Operating
SNARE MushMush Foundation B. Operating
Glutton MushMush Foundation B. Operating
WhisperPot The Honeynet Project B. Operating
BuffaLogs Certego B. Operating
RIoTPot The Honeynet Project B. Operating
Conpot The Honeynet Project B. Operating
PcapMonkey The Honeynet Project B. Operating
Kippo The Honeynet Project B. Operating
IP address reputation Spaumhaus Project B. Operating
Malware Digest Spamhaus Project B. Operating
Wireshark Wireshark Foundation B. Operating
Metasploit Rapid7 B. Operating
TOR Node List dan.me.uk B. Operating
Workbook on Security: Practical Steps for Human Rights Defenders at Risk Frontline Defenders B. Operating
Online Harassment Field Manual Pen America B. Operating

Legend

The organizations responsible for each solution are represented by the following color-coded entity types

Nonprofit
Academia
Government Agency
Intergovernmental Organization
Commercial
ISAC/ISAO
SDO
Individual or Group of Volunteers

Join Us

Click below for our recent efforts and to sign up for upcoming news