Common Good Cyber Mapping
Submit a ToolThis database collects information about free cybersecurity tools, services and platforms deployed to make the Internet safer in the public interest. Future work includes data analysis through the development of a dashboard and research efforts.
Submit a ToolSolution | Organisation | Cybersecurity Function |
---|---|---|
Tiq-test | MLSec Project | B. Operating |
ThreatTracker | Michael Yip | B. Operating |
Threatcrowd API | Jon Heise | B. Operating |
Threat intel | Yelp | B. Operating |
Tor Browser | The Tor Project | B. Operating |
0xSI f33d | seguranca-informatica.pt | B. Operating |
2factorauth | 2factorauth | F. Data gathering not associated with any particular function |
2FAS | 2FAS | B. Operating |
AIDE | Global Cyber Alliance | B. Operating |
Phishing Activity Trends Report | Anti-Phishing Working Group (APWG) | B. Operating |
Automated Indicator Sharing (AIS) | CISA | B. Operating |
Malicious Domain Suspension (AMDoS) | Anti-Phishing Working Group (APWG) | C. Naming Numbering and Routing |
ATT&CK | MITRE | B. Operating |
eCrime eXchange | Anti-Phishing Working Group (APWG) | B. Operating |
AbuseIPDB | Marathon Studios Inc | B. Operating |
Feodo Tracker | Abuse.ch | B. Operating |
AbuseHelper | Clarified Networks | B. Operating |
Malware Bazaar | Abuse.ch | B. Operating |
AbuseIO | AbuseIO | B. Operating |
AVG | AVG | B. Operating |
Action Fraud | National Fraud & Cyber Crime Reporting Centre | B. Operating |
ActorTrackr | ActorTrackr | B. Operating |
Digital Security Helpline | Access Now | B. Operating |
Aircrack-ng | Aircrack-ng | B. Operating |
syft | Anchore | B. Operating |
Cyber Threat Alliance Platform | Cyber Threat Alliance | B. Operating |
grype | Anchore | B. Operating |
SpamAssassin | Apache Software Foundation | B. Operating |
Apache Syncope | Apache Software Foundation | B. Operating |
Avast Mobile Security for Android | Avast | B. Operating |
Counterfit | Azure | B. Operating |
TekDefense-Automater | 1aN0rmus | B. Operating |
BBB Scam Tracker | Better Business Bureau | B. Operating |
BGP Ranking | CIRCL | B. Operating |
BOTVRIJ.EU | botvrij.eu | B. Operating |
Bearded Avenger | CSIRT GADGETS, LLC | B. Operating |
BlueBox | svdwi | B. Operating |
Blueprint for Ransomware Defense | Institute for Security & Technology | B. Operating |
BruteForceBlocker | Daniel Gerzo | B. Operating |
Common Attack Pattern Enumeration and Classification (CAPEC) | MITRE | B. Operating |
Collective Intelligence Framework (CIF) | CSIRT GADGETS, LLC | B. Operating |
CIS-CAT Lite | Center for Internet Security (CIS) | B. Operating |
Warning List | NASK | B. Operating |
Cyber Security Evaluation Tool (CSET) | CISA | B. Operating |
Cybersecurity Toolkit and Resources to Protect Elections | CISA | B. Operating |
Automated Indicator Sharing (AIS) | CISA | B. Operating |
CISA CPG Checklist | CISA | B. Operating |
CRITS | MITRE Corporation | B. Operating |
MS-ISAC Security Operations Center (SOC) | Center for Internet Security | B. Operating |
Cacador | sroberts | B. Operating |
CSA Research | Cloud Security Alliance | B. Operating |
Caldera | MITRE | B. Operating |
Cascade | MITRE | B. Operating |
Electiontools.org | Center for Tech and Civic Life | B. Operating |
CertStream | CertStream | B. Operating |
Childline Toolbox | Childline | B. Operating |
OpenDNS Home | Cisco | B. Operating |
ClamAV | ClamAV | B. Operating |
Cloudflare Free SSL certificate | Cloudflare | B. Operating |
Zero Trust Resource Hub | Cloud Security Alliance | B. Operating |
Athenian Project | Cloudflare | B. Operating |
Project Galileo | Cloudflare | B. Operating |
Cobian Backup | CobianSoft | B. Operating |
Coalition Against Stalkerware | Coalition Against Stalkerware | B. Operating |
Combine | mlsecproject | B. Operating |
Comcast Report Abuse | Comcast Cable Communications, LLC | B. Operating |
Media ratings and reviews | Common Sense Media | B. Operating |
Security Planner | Consumer Reports | B. Operating |
Weekly Patch Report | Secure The Village | B. Operating |
CodeSec | Contrast Security | B. Operating |
Cortex | The Hive Project | B. Operating |
Cross Sector Threat Intelligence Sharing | Canadian Cyber Threat Exchange (CCTX) | B. Operating |
CrowdFMS | CrowdStrike | B. Operating |
Cuckoo Sandbox | Cuckoo Sandbox | B. Operating |
STIX | OASIS Open | C. Naming Numbering and Routing |
CyberPeace Builders | CyberPeace Institute | B. Operating |
CyberGreen Stats | CyberGreen Institute | B. Operating |
CyberPeace Cafes | CyberPeace Institute | B. Operating |
CyBot | cylance | B. Operating |
CyberPeace Watch | CyberPeace Institute | B. Operating |
Cyber Leader Certification Program | Cyber Readiness Institute | B. Operating |
Cyber Readiness Program | Cyber Readiness Institute | B. Operating |
Cyber Defenders | Cyber Defenders | B. Operating |
Cyber Cure free intelligence feeds | Nucleon | B. Operating |
CyberSecure My Business | National Cybersecurity Alliance | B. Operating |
Cyber Analytics Repository | MITRE | B. Operating |
Cyber Civil Rights Initiative | Cyber Civil Rights Initiative | B. Operating |
Cyber Threat Intelligence Repository | MITRE | B. Operating |
Cybersecurity Toolkit for Small Business | Global Cyber Alliance | B. Operating |
Cybersecurity KickStart for Nonprofits | Sightline Security | B. Operating |
Cybersecurity Toolkit for Mission-Based Organizations | Global Cyber Alliance | B. Operating |
Cybersecurity Toolkit for Elections | Global Cyber Alliance | B. Operating |
Cybersecurity Toolkit for Individuals | Global Cyber Alliance | B. Operating |
Cybersecurity Toolkit for Journalists | Global Cyber Alliance | B. Operating |
Shadowserver Dashboard | Shadowserver Foundation | B. Operating |
Cyware Threat Intelligence Feeds | Cyware | B. Operating |
Cyfin | NCFTA | B. Operating |
DMARC Setup Guide & Resources | Global Cyber Alliance | B. Operating |
BGP Lookup | dan.me.uk | B. Operating |
DataPlane.org | Dataplane.org | B. Operating |
Diceware | Diceware | B. Operating |
DigitalSide Threat-Intel | DigitalSide Threat Intel | B. Operating |
Domain Trust | Global Cyber Alliance | C. Naming Numbering and Routing |
DuckDuckGo | DuckDuckGo | B. Operating |
ECrime Labs | eCrimeLabs | B. Operating |
Surveillance Self-Defense | Electronic Frontier Foundation (EFF) | B. Operating |
Enigmail | Deutsche Post | B. Operating |
Emerging Threats IDS Rules | Proofpoint, Inc | B. Operating |
Emerging Threats Firewall Rules | Proofpoint, Inc | B. Operating |
Red Team Automation | Endgame | B. Operating |
ExoneraTor | The Tor Project | B. Operating |
Community IP Threatlists | Fastintercept | B. Operating |
Fenrir | Neo23x0 | B. Operating |
Romance Scam Recovery Group | Cybercrime Support Network | B. Operating |
FireHOL IP Aggregator | spacepatcher | B. Operating |
FireHOL IP Lists | Fire Hol | B. Operating |
Forager | opensourcesec | B. Operating |
Cybersecurity Assessment Tool | Ford Foundation | B. Operating |
FraudGuard | FraudGuard.io | B. Operating |
Free Threat Intel | Bert-IanP | B. Operating |
A handbook to modern mobile maintenance | Freedom of the Press Foundation | B. Operating |
LGBTQ Digital Safety Guide | GLAAD | B. Operating |
GOSINT | Cisco | B. Operating |
Responding to Blackmail | Games Hotline | B. Operating |
Gen Pride Seattle | Gen Pride Seattle | B. Operating |
The Get Safe Online Alert system | Get Safe Online | B. Operating |
Digital Security of LGBTQI Aid Workers | The Global Interagency Security Forum (GISF) | B. Operating |
GRF Ransomware Report | Global Resilience Federation | B. Operating |
Google Authenticator | B. Operating | |
GoatRider | BinaryDefense | B. Operating |
Operational Resilience Framework (ORF) | Global Resilience Federation | B. Operating |
Google Safe Browsing | B. Operating | |
Google ClusterFuzz | B. Operating | |
Google OSS-Fuzz | B. Operating | |
Greenbone OpenVAS | Greenbone | B. Operating |
GreenSnow | Green Snow | B. Operating |
Hashcat | Hashcat | B. Operating |
Have i been pwned | Have I Been Pwned | B. Operating |
Hippocampe | The Hive Project | B. Operating |
Intel Owl | The Honeynet Project | B. Operating |
HoneyDB | Deception Logic, Inc. | B. Operating |
Hybrid-Analysis | Payload Security | B. Operating |
I-Blocklist | I-Blocklist | B. Operating |
Intrusion Detection Message Exchange Format (IDMEF) | Internet Engineering Task Force | D. Transporting |
Immuniweb | Immuniweb | B. Operating |
IntelMQ | European CERTs | B. Operating |
Internet Crime Complaint Center | FBI | B. Operating |
TALK checklist | Internet Watch Foundation | B. Operating |
The IWF Reporting Portals | Internet Watch Foundation | B. Operating |
My Family’s Digital Toolkit | Internet Matters | B. Operating |
James Brine Threat Intelligence Feeds | James Brine | B. Operating |
KeePass | B. Operating | |
KLara | Kaspersky | B. Operating |
KeeWeb | Antelle | B. Operating |
Kali Linux | KALI | B. Operating |
KQL Hunting Queries Detection Rules | Bert JanP | B. Operating |
Keycloak | Red Hat | B. Operating |
Keexybox Project | KeexyBox Project | B. Operating |
Kestrel Threat Hunting Language | Open Cybersecurity Alliance | B. Operating |
LookUp | Sai Santhosh | B. Operating |
Loki | Neo23x0 | B. Operating |
MISP Core Format | Internet Engineering Task Force | C. Naming Numbering and Routing |
MISP | CIRCL | B. Operating |
Machinae | Hurricane Labs | B. Operating |
Malware Attribute Enumeration and Characterization (MAEC™) | MITRE | C. Naming Numbering and Routing |
MISP Workbench | CIRCL | B. Operating |
MSTIC Jupyter and Python Security Tools | Microsoft | B. Operating |
MANTIS | Mantis | B. Operating |
MISP-Taxii-Server | CIRCL | B. Operating |
Malpedia | Fraunhofer FKIE | B. Operating |
Majestic Million | Magestic | B. Operating |
MalPipe | Silas Cutler | B. Operating |
MalShare Project | Silas Cutler | B. Operating |
Malcolm | CISA | B. Operating |
ManaTI | stratosphereips | B. Operating |
Malware Traffic Analysis | Malware Traffic Analysis | B. Operating |
Malware IOC | ESET | B. Operating |
Megatron | CERT-SE | B. Operating |
MineMeld | Palo Alto Networks | B. Operating |
Military & Veteran Program | Cybercrime Support Network | B. Operating |
Mirai Security | Mirai tracker | B. Operating |
C2 Tracker | Monty Security | B. Operating |
NMAP | Gordon Lyon | B. Operating |
N6 | CERT Polska | B. Operating |
No More Ransom | Europol | B. Operating |
Newly-Registered Domain Lists from Stamus Labs | Stamus Networks | B. Operating |
NoThink! | Matteo Cantoni | B. Operating |
Nyx | paulpc | B. Operating |
OWASP CycloneDX | OWASP | B. Operating |
OWASP Defectdojo | OWASP | B. Operating |
OSTrICa | Ptr32Void | B. Operating |
OWASP SAMM | OWASP | B. Operating |
OWASP Cheat Sheet Series | OWASP | B. Operating |
MetaDefender Access for Community | OPSWAT | B. Operating |
OWASP Application Security Verification Standard (ASVS) | OWASP | B. Operating |
OWASP Mobile Application Security | OWASP | B. Operating |
OWASP Juice Shop | OWASP | B. Operating |
OWASP OWTF | OWASP | B. Operating |
OWASP CSRFGuard | OWASP | B. Operating |
OWASP Amass | OWASP | B. Operating |
OTX | LevelBlue | B. Operating |
OWASP CRS | OWASP | B. Operating |
OWASP Dependency-Check | OWASP | B. Operating |
ZAP Attack Proxy | ZAP | B. Operating |
OWASP Web Security Testing Guide | OWASP | B. Operating |
OWASP Security Knowledge Framework | OWASP | B. Operating |
OWASP ModSecurity Core Rule Set | OWASP | B. Operating |
OWASP Security Shepherd | OWASP | B. Operating |
OWASP Top 10 | OWASP | B. Operating |
OWASP ZAP | ZAP Dev Team | B. Operating |
OSINT Omnibus | InQuest | B. Operating |
OpenPhish Feeds | OpenPhish | B. Operating |
OASIS Open Command and Control (OpenC2) TC | OASIS Open | B. Operating |
OpenSSH | OpenBSD Project | B. Operating |
OpenEDR | Xcitium | B. Operating |
OpenSecurityTraining2 | OpenSecurityTraining2 | B. Operating |
Quad9 | Quad9 | B. Operating |
BruteSpray | x90skysn3k | B. Operating |
OpenPGP | OpenPGP | B. Operating |
Allstar | Open Source Security Foundation (OpenSSF) | B. Operating |
Go Safeweb | B. Operating | |
Netfilter | The Netfilter webmasters | B. Operating |
Nikto 2.5 | CIRT.net | B. Operating |
Kismet | Kismet | B. Operating |
OpenSSF Scorecard | OpenSSF | B. Operating |
Atomic Red Team | Atomic Red Team | B. Operating |
Santa | B. Operating | |
Suricata | Open Information Security Foundation (OISF) | B. Operating |
Tsunami Security Scanner | B. Operating | |
Enterprise Log Search and Archive (ELSA) | Martin Holste | B. Operating |
sqlmap | sqlmap | B. Operating |
Open Source Insights | B. Operating | |
timesketch | timesketch | B. Operating |
Open Source Vulnerabilities | OSV | B. Operating |
Openioc-to-stix | STIX Project | B. Operating |
Digital Corps | Out in Tech | F. Data gathering not associated with any particular function |
Ossec | Trend Micro | B. Operating |
Parent Zone | Parent Zone | B. Operating |
PhotoRec | CGSecurity | B. Operating |
PfSense | Rubicon Communications, LLC ( Netgate ) | B. Operating |
Poortego | mgeide | B. Operating |
PrivacyIDEA | Privacy IDEA | B. Operating |
PyIOCe | Yahoo | B. Operating |
QRadio | QTek | B. Operating |
RITA | Active Countermeasures | B. Operating |
Rastrea2r | Ismael Valenzuela | B. Operating |
Ransomware Playbook | Cyber Readiness Institute | B. Operating |
ReversingLabs YARA Rules | Reversing Labs | B. Operating |
Registrar of Last Resort (ROLR) | Shadowserver Foundation | C. Naming Numbering and Routing |
Rutgers Blacklisted IPs | Rutgers | B. Operating |
Routersploit | SANS Institute | B. Operating |
SiLK | Carnegie Mellon University | B. Operating |
Scapy | Philippe Biondi | B. Operating |
Remnux | SANS Institute | B. Operating |
Snort | Cisco | B. Operating |
SCARS Institute Learning | The Society of Citizens Against Relationships Scams (SCARS) | B. Operating |
Safetag | Internews | B. Operating |
SRA TAXII2 Server | Security Risk Advisors | B. Operating |
STIX Shifter | Open Cybersecurity Alliance | B. Operating |
Scumblr | Netflix | B. Operating |
Scam Survival Toolkit | Better Business Bureau | B. Operating |
Check a website | Get Safe Online | B. Operating |
Scam Survivor Healing | Scam Survivor Healing | B. Operating |
Secureworks PhishInSuits | Secureworks | B. Operating |
Vane2 | Secureworks | B. Operating |
Batea | Secureworks | B. Operating |
Secureworks WhiskeySAML | Secureworks | B. Operating |
Secureworks Dalton | Secureworks | B. Operating |
SecurityScorecard IoCs | SecurityScorecard | B. Operating |
Signal | Signal | B. Operating |
Signature-base | Neo23x0 | B. Operating |
Softrace | Alexander Bolshakov | B. Operating |
Splunk Attack Detection Collector | Splunk Enterprise | B. Operating |
Splunk Synthetic Adversarial Log Objects | Splunk Enterprise | B. Operating |
Splunk Attack Range | Splunk Enterprise | B. Operating |
Stixview | Sergey Polzunov | B. Operating |
StoQ | PUNCH Cyber Analytics Group | B. Operating |
Stix-viz | MITRE | B. Operating |
Stop. Think. Connect. campaign | STOP.THINK.CONNECT | B. Operating |
TARDIS | Tripwire Inc. | B. Operating |
Data Detox Kit | Data Detox Kit | B. Operating |
Telegram | Telegram | B. Operating |
TestDisk | CGSecurity | B. Operating |
ThreatExchange | Meta | B. Operating |
ThreatMiner | Threatminer | B. Operating |
Domain Reputation | Spamhaus Project | B. Operating |
Threat Intelligence Hunter | abhinav singh | B. Operating |
Online Safety for LGBTQ+ Young People | The Trevor Project | B. Operating |
ThreatIngestor | InQuest | B. Operating |
ThreatAggregator | jpsenior | B. Operating |
Threatcmd | Jon Heise | B. Operating |
Threatfeeds.io | Pulsedive Community | B. Operating |
TypeDB CTI | TypeDB | B. Operating |
Uber-Common | Uber | B. Operating |
Victim Connect Resource Center | National Center for Victims of Crime | B. Operating |
WOMBAT Project | France Télécom | B. Operating |
Yara Rules | Yara Rules Project | B. Operating |
YETI | Yeti | B. Operating |
Internet Threat Exposure Analysis | Zscaler | B. Operating |
Ransomware Assessment | Zscaler | B. Operating |
TAXII | OASIS Open | D. Transporting |
SSL Blacklist (SSLBL) | Abuse.ch | B. Operating |
URLhaus | Abuse.ch | B. Operating |
ThreatFox | Abuse.ch | B. Operating |
YARAify | Abuse.ch | B. Operating |
Cobian Reflector | CobianSoft | B. Operating |
AI Security | Global Resilience Federation | B. Operating |
Let’s Encrypt | Internet Security Research Group (ISRG) | B. Operating |
MANRS | Global Cyber Alliance | C. Naming Numbering and Routing |
mitmproxy | The Honeynet Project | B. Operating |
DroidBot | The Honeynet Project | B. Operating |
GreedyBear | IntelOwl | B. Operating |
DRAKVUF | The Honeynet Project | B. Operating |
honeyscanner | The Honeynet Project | B. Operating |
thug | The Honeynet Project | B. Operating |
dionaea | The Honeynet Project | B. Operating |
Glastopf | MushMush Foundation | B. Operating |
T-Pot | The Honeynet Project | B. Operating |
TANNER | The Honeynet Project | B. Operating |
SNARE | MushMush Foundation | B. Operating |
Glutton | MushMush Foundation | B. Operating |
WhisperPot | The Honeynet Project | B. Operating |
BuffaLogs | Certego | B. Operating |
RIoTPot | The Honeynet Project | B. Operating |
Conpot | The Honeynet Project | B. Operating |
PcapMonkey | The Honeynet Project | B. Operating |
Kippo | The Honeynet Project | B. Operating |
IP address reputation | Spaumhaus Project | B. Operating |
Malware Digest | Spamhaus Project | B. Operating |
Wireshark | Wireshark Foundation | B. Operating |
Metasploit | Rapid7 | B. Operating |
TOR Node List | dan.me.uk | B. Operating |
Workbook on Security: Practical Steps for Human Rights Defenders at Risk | Frontline Defenders | B. Operating |
Online Harassment Field Manual | Pen America | B. Operating |
Legend
The organizations responsible for each solution are represented by the following color-coded entity types
Nonprofit
Academia
Government Agency
Intergovernmental Organization
Commercial
ISAC/ISAO
SDO
Individual or Group of Volunteers