Common Good Cyber Mapping

Submit a Tool

This database collects information about free cybersecurity tools, services and platforms deployed to make the Internet safer in the public interest. Future work includes data analysis through the development of a dashboard and research efforts.

Submit a Tool
Solution Organisation Cybersecurity Function
Tiq-testMLSec Project B. Operating
ThreatTrackerMichael Yip B. Operating
Threatcrowd APIJon HeiseB. Operating
Threat intelYelpB. Operating
Tor BrowserThe Tor ProjectB. Operating
0xSI f33dseguranca-informatica.ptB. Operating
2factorauth2factorauthF. Data gathering not associated with any particular function
2FAS2FASB. Operating
AIDEGlobal Cyber AllianceB. Operating
Phishing Activity Trends ReportAnti-Phishing Working Group (APWG)B. Operating
Automated Indicator Sharing (AIS)CISAB. Operating
Malicious Domain Suspension (AMDoS)Anti-Phishing Working Group (APWG)C. Naming Numbering and Routing
ATT&CKMITREB. Operating
eCrime eXchangeAnti-Phishing Working Group (APWG)B. Operating
AbuseIPDBMarathon Studios IncB. Operating
Feodo TrackerAbuse.chB. Operating
AbuseHelperClarified NetworksB. Operating
Malware BazaarAbuse.chB. Operating
AbuseIOAbuseIOB. Operating
AVGAVGB. Operating
Action FraudNational Fraud & Cyber Crime Reporting CentreB. Operating
ActorTrackrActorTrackrB. Operating
Digital Security HelplineAccess NowB. Operating
Aircrack-ngAircrack-ngB. Operating
syftAnchoreB. Operating
Cyber Threat Alliance PlatformCyber Threat AllianceB. Operating
grypeAnchoreB. Operating
SpamAssassinApache Software FoundationB. Operating
Apache SyncopeApache Software FoundationB. Operating
Avast Mobile Security for AndroidAvastB. Operating
CounterfitAzureB. Operating
TekDefense-Automater1aN0rmusB. Operating
BBB Scam TrackerBetter Business BureauB. Operating
BGP RankingCIRCLB. Operating
BOTVRIJ.EUbotvrij.euB. Operating
Bearded AvengerCSIRT GADGETS, LLCB. Operating
BlueBoxsvdwiB. Operating
Blueprint for Ransomware DefenseInstitute for Security & TechnologyB. Operating
BruteForceBlockerDaniel GerzoB. Operating
Common Attack Pattern Enumeration and Classification (CAPEC)MITREB. Operating
Collective Intelligence Framework (CIF)CSIRT GADGETS, LLCB. Operating
CIS-CAT LiteCenter for Internet Security (CIS)B. Operating
Warning ListNASK B. Operating
Cyber Security Evaluation Tool (CSET)CISAB. Operating
Cybersecurity Toolkit and Resources to Protect ElectionsCISAB. Operating
Automated Indicator Sharing (AIS)CISAB. Operating
CISA CPG ChecklistCISAB. Operating
CRITSMITRE CorporationB. Operating
MS-ISAC Security Operations Center (SOC)Center for Internet SecurityB. Operating
CacadorsrobertsB. Operating
CSA ResearchCloud Security AllianceB. Operating
CalderaMITREB. Operating
CascadeMITREB. Operating
Electiontools.orgCenter for Tech and Civic LifeB. Operating
CertStreamCertStreamB. Operating
Childline ToolboxChildlineB. Operating
OpenDNS HomeCiscoB. Operating
ClamAVClamAVB. Operating
Cloudflare Free SSL certificateCloudflareB. Operating
Zero Trust Resource Hub Cloud Security AllianceB. Operating
Athenian ProjectCloudflareB. Operating
Project GalileoCloudflareB. Operating
Cobian BackupCobianSoftB. Operating
Coalition Against StalkerwareCoalition Against StalkerwareB. Operating
CombinemlsecprojectB. Operating
Comcast Report AbuseComcast Cable Communications, LLCB. Operating
Media ratings and reviewsCommon Sense MediaB. Operating
Security PlannerConsumer ReportsB. Operating
Weekly Patch ReportSecure The VillageB. Operating
CodeSecContrast SecurityB. Operating
CortexThe Hive ProjectB. Operating
Cross Sector Threat Intelligence SharingCanadian Cyber Threat Exchange (CCTX)B. Operating
CrowdFMSCrowdStrikeB. Operating
Cuckoo SandboxCuckoo SandboxB. Operating
STIXOASIS OpenC. Naming Numbering and Routing
CyberPeace BuildersCyberPeace InstituteB. Operating
CyberGreen StatsCyberGreen InstituteB. Operating
CyberPeace CafesCyberPeace InstituteB. Operating
CyBotcylanceB. Operating
CyberPeace WatchCyberPeace InstituteB. Operating
Cyber Leader Certification ProgramCyber Readiness InstituteB. Operating
Cyber Readiness ProgramCyber Readiness InstituteB. Operating
Cyber DefendersCyber DefendersB. Operating
Cyber Cure free intelligence feedsNucleonB. Operating
CyberSecure My BusinessNational Cybersecurity AllianceB. Operating
Cyber Analytics RepositoryMITREB. Operating
Cyber Civil Rights InitiativeCyber Civil Rights InitiativeB. Operating
Cyber Threat Intelligence RepositoryMITREB. Operating
Cybersecurity Toolkit for Small BusinessGlobal Cyber AllianceB. Operating
Cybersecurity KickStart for NonprofitsSightline SecurityB. Operating
Cybersecurity Toolkit for Mission-Based OrganizationsGlobal Cyber AllianceB. Operating
Cybersecurity Toolkit for ElectionsGlobal Cyber AllianceB. Operating
Cybersecurity Toolkit for IndividualsGlobal Cyber AllianceB. Operating
Cybersecurity Toolkit for JournalistsGlobal Cyber AllianceB. Operating
Shadowserver DashboardShadowserver FoundationB. Operating
Cyware Threat Intelligence FeedsCywareB. Operating
CyfinNCFTAB. Operating
DMARC Setup Guide & ResourcesGlobal Cyber AllianceB. Operating
BGP Lookupdan.me.ukB. Operating
DataPlane.orgDataplane.orgB. Operating
DicewareDicewareB. Operating
DigitalSide Threat-IntelDigitalSide Threat IntelB. Operating
Domain TrustGlobal Cyber AllianceC. Naming Numbering and Routing
DuckDuckGoDuckDuckGoB. Operating
ECrime LabseCrimeLabsB. Operating
Surveillance Self-DefenseElectronic Frontier Foundation (EFF)B. Operating
EnigmailDeutsche PostB. Operating
Emerging Threats IDS RulesProofpoint, Inc B. Operating
Emerging Threats Firewall RulesProofpoint, Inc B. Operating
Red Team AutomationEndgameB. Operating
ExoneraTorThe Tor ProjectB. Operating
Community IP ThreatlistsFastinterceptB. Operating
FenrirNeo23x0B. Operating
Romance Scam Recovery GroupCybercrime Support NetworkB. Operating
FireHOL IP AggregatorspacepatcherB. Operating
FireHOL IP ListsFire Hol B. Operating
ForageropensourcesecB. Operating
Cybersecurity Assessment ToolFord FoundationB. Operating
FraudGuardFraudGuard.io B. Operating
Free Threat IntelBert-IanPB. Operating
A handbook to modern mobile maintenanceFreedom of the Press FoundationB. Operating
LGBTQ Digital Safety GuideGLAADB. Operating
GOSINTCisco B. Operating
Responding to BlackmailGames HotlineB. Operating
Gen Pride SeattleGen Pride Seattle B. Operating
The Get Safe Online Alert systemGet Safe OnlineB. Operating
Digital Security of LGBTQI Aid WorkersThe Global Interagency Security Forum (GISF)B. Operating
GRF Ransomware ReportGlobal Resilience FederationB. Operating
Google AuthenticatorGoogleB. Operating
GoatRiderBinaryDefenseB. Operating
Operational Resilience Framework (ORF)Global Resilience FederationB. Operating
Google Safe BrowsingGoogleB. Operating
Google ClusterFuzzGoogleB. Operating
Google OSS-FuzzGoogleB. Operating
Greenbone OpenVASGreenboneB. Operating
GreenSnowGreen SnowB. Operating
HashcatHashcatB. Operating
Have i been pwnedHave I Been PwnedB. Operating
HippocampeThe Hive ProjectB. Operating
Intel OwlThe Honeynet ProjectB. Operating
HoneyDBDeception Logic, Inc.B. Operating
Hybrid-AnalysisPayload SecurityB. Operating
I-BlocklistI-BlocklistB. Operating
Intrusion Detection Message Exchange Format (IDMEF)Internet Engineering Task ForceD. Transporting
ImmuniwebImmuniwebB. Operating
IntelMQEuropean CERTs B. Operating
Internet Crime Complaint CenterFBIB. Operating
TALK checklistInternet Watch FoundationB. Operating
The IWF Reporting PortalsInternet Watch FoundationB. Operating
My Family’s Digital ToolkitInternet MattersB. Operating
James Brine Threat Intelligence FeedsJames BrineB. Operating
KeePassGoogleB. Operating
KLaraKasperskyB. Operating
KeeWebAntelleB. Operating
Kali LinuxKALIB. Operating
KQL Hunting Queries Detection RulesBert JanPB. Operating
KeycloakRed HatB. Operating
Keexybox ProjectKeexyBox ProjectB. Operating
Kestrel Threat Hunting LanguageOpen Cybersecurity AllianceB. Operating
LookUpSai SanthoshB. Operating
LokiNeo23x0B. Operating
MISP Core FormatInternet Engineering Task ForceC. Naming Numbering and Routing
MISPCIRCL B. Operating
MachinaeHurricane LabsB. Operating
Malware Attribute Enumeration and Characterization (MAEC™)MITREC. Naming Numbering and Routing
MISP WorkbenchCIRCL B. Operating
MSTIC Jupyter and Python Security ToolsMicrosoftB. Operating
MANTISMantisB. Operating
MISP-Taxii-ServerCIRCLB. Operating
MalpediaFraunhofer FKIEB. Operating
Majestic MillionMagesticB. Operating
MalPipeSilas CutlerB. Operating
MalShare Project Silas CutlerB. Operating
MalcolmCISAB. Operating
ManaTIstratosphereipsB. Operating
Malware Traffic AnalysisMalware Traffic Analysis B. Operating
Malware IOCESETB. Operating
MegatronCERT-SEB. Operating
MineMeldPalo Alto NetworksB. Operating
Military & Veteran ProgramCybercrime Support NetworkB. Operating
Mirai SecurityMirai trackerB. Operating
C2 TrackerMonty SecurityB. Operating
NMAPGordon LyonB. Operating
N6CERT PolskaB. Operating
No More RansomEuropolB. Operating
Newly-Registered Domain Lists from Stamus LabsStamus NetworksB. Operating
NoThink!Matteo CantoniB. Operating
NyxpaulpcB. Operating
OWASP CycloneDXOWASPB. Operating
OWASP DefectdojoOWASP B. Operating
OSTrICaPtr32VoidB. Operating
OWASP SAMMOWASPB. Operating
OWASP Cheat Sheet SeriesOWASPB. Operating
MetaDefender Access for CommunityOPSWATB. Operating
OWASP Application Security Verification Standard (ASVS)OWASPB. Operating
OWASP Mobile Application SecurityOWASPB. Operating
OWASP Juice ShopOWASPB. Operating
OWASP OWTFOWASPB. Operating
OWASP CSRFGuardOWASPB. Operating
OWASP AmassOWASPB. Operating
OTXLevelBlue B. Operating
OWASP CRSOWASPB. Operating
OWASP Dependency-CheckOWASPB. Operating
ZAP Attack ProxyZAPB. Operating
OWASP Web Security Testing GuideOWASPB. Operating
OWASP Security Knowledge FrameworkOWASPB. Operating
OWASP ModSecurity Core Rule SetOWASPB. Operating
OWASP Security ShepherdOWASPB. Operating
OWASP Top 10OWASPB. Operating
OWASP ZAPZAP Dev TeamB. Operating
OSINT OmnibusInQuestB. Operating
OpenPhish FeedsOpenPhishB. Operating
OASIS Open Command and Control (OpenC2) TCOASIS OpenB. Operating
OpenSSHOpenBSD ProjectB. Operating
OpenEDRXcitiumB. Operating
OpenSecurityTraining2OpenSecurityTraining2B. Operating
Quad9Quad9B. Operating
BruteSprayx90skysn3kB. Operating
OpenPGPOpenPGPB. Operating
AllstarOpen Source Security Foundation (OpenSSF)B. Operating
Go SafewebGoogleB. Operating
NetfilterThe Netfilter webmastersB. Operating
Nikto 2.5CIRT.netB. Operating
KismetKismetB. Operating
OpenSSF ScorecardOpenSSFB. Operating
Atomic Red TeamAtomic Red TeamB. Operating
SantaGoogleB. Operating
SuricataOpen Information Security Foundation (OISF)B. Operating
Tsunami Security ScannerGoogleB. Operating
Enterprise Log Search and Archive (ELSA)Martin HolsteB. Operating
sqlmapsqlmapB. Operating
Open Source InsightsGoogleB. Operating
timesketchtimesketchB. Operating
Open Source VulnerabilitiesOSVB. Operating
Openioc-to-stixSTIX ProjectB. Operating
Digital CorpsOut in TechF. Data gathering not associated with any particular function
OssecTrend MicroB. Operating
Parent ZoneParent ZoneB. Operating
PhotoRecCGSecurityB. Operating
PfSenseRubicon Communications, LLC ( Netgate )B. Operating
PoortegomgeideB. Operating
PrivacyIDEAPrivacy IDEAB. Operating
PyIOCeYahooB. Operating
QRadioQTekB. Operating
RITAActive CountermeasuresB. Operating
Rastrea2rIsmael ValenzuelaB. Operating
Ransomware PlaybookCyber Readiness InstituteB. Operating
ReversingLabs YARA RulesReversing LabsB. Operating
Registrar of Last Resort (ROLR)Shadowserver FoundationC. Naming Numbering and Routing
Rutgers Blacklisted IPsRutgersB. Operating
RoutersploitSANS InstituteB. Operating
SiLKCarnegie Mellon UniversityB. Operating
ScapyPhilippe BiondiB. Operating
RemnuxSANS InstituteB. Operating
SnortCiscoB. Operating
SCARS Institute LearningThe Society of Citizens Against Relationships Scams (SCARS)B. Operating
SafetagInternewsB. Operating
SRA TAXII2 ServerSecurity Risk AdvisorsB. Operating
STIX ShifterOpen Cybersecurity AllianceB. Operating
ScumblrNetflixB. Operating
Scam Survival ToolkitBetter Business BureauB. Operating
Check a websiteGet Safe OnlineB. Operating
Scam Survivor HealingScam Survivor HealingB. Operating
Secureworks PhishInSuitsSecureworksB. Operating
Vane2SecureworksB. Operating
BateaSecureworksB. Operating
Secureworks WhiskeySAMLSecureworksB. Operating
Secureworks DaltonSecureworksB. Operating
SecurityScorecard IoCsSecurityScorecardB. Operating
SignalSignalB. Operating
Signature-baseNeo23x0B. Operating
SoftraceAlexander BolshakovB. Operating
Splunk Attack Detection CollectorSplunk EnterpriseB. Operating
Splunk Synthetic Adversarial Log ObjectsSplunk EnterpriseB. Operating
Splunk Attack RangeSplunk EnterpriseB. Operating
StixviewSergey Polzunov B. Operating
StoQPUNCH Cyber Analytics GroupB. Operating
Stix-vizMITREB. Operating
Stop. Think. Connect. campaignSTOP.THINK.CONNECTB. Operating
TARDISTripwire Inc.B. Operating
Data Detox KitData Detox KitB. Operating
TelegramTelegramB. Operating
TestDiskCGSecurityB. Operating
ThreatExchangeMetaB. Operating
ThreatMinerThreatminerB. Operating
Domain ReputationSpamhaus ProjectB. Operating
Threat Intelligence Hunterabhinav singh B. Operating
Online Safety for LGBTQ+ Young PeopleThe Trevor ProjectB. Operating
ThreatIngestorInQuest B. Operating
ThreatAggregatorjpseniorB. Operating
ThreatcmdJon Heise B. Operating
Threatfeeds.ioPulsedive CommunityB. Operating
TypeDB CTITypeDBB. Operating
Uber-CommonUberB. Operating
Victim Connect Resource CenterNational Center for Victims of CrimeB. Operating
WOMBAT ProjectFrance TélécomB. Operating
Yara RulesYara Rules ProjectB. Operating
YETIYetiB. Operating
Internet Threat Exposure AnalysisZscalerB. Operating
Ransomware AssessmentZscalerB. Operating
TAXIIOASIS OpenD. Transporting
SSL Blacklist (SSLBL)Abuse.chB. Operating
URLhausAbuse.chB. Operating
ThreatFoxAbuse.chB. Operating
YARAifyAbuse.chB. Operating
Cobian ReflectorCobianSoftB. Operating
AI SecurityGlobal Resilience FederationB. Operating
Let’s EncryptInternet Security Research Group (ISRG)B. Operating
MANRSGlobal Cyber AllianceC. Naming Numbering and Routing
mitmproxyThe Honeynet ProjectB. Operating
DroidBotThe Honeynet Project B. Operating
GreedyBearIntelOwlB. Operating
DRAKVUFThe Honeynet ProjectB. Operating
honeyscannerThe Honeynet ProjectB. Operating
thugThe Honeynet ProjectB. Operating
dionaeaThe Honeynet ProjectB. Operating
GlastopfMushMush FoundationB. Operating
T-PotThe Honeynet ProjectB. Operating
TANNERThe Honeynet ProjectB. Operating
SNAREMushMush FoundationB. Operating
GluttonMushMush FoundationB. Operating
WhisperPotThe Honeynet ProjectB. Operating
BuffaLogsCertegoB. Operating
RIoTPotThe Honeynet ProjectB. Operating
ConpotThe Honeynet ProjectB. Operating
PcapMonkeyThe Honeynet ProjectB. Operating
Kippo The Honeynet ProjectB. Operating
IP address reputationSpaumhaus ProjectB. Operating
Malware DigestSpamhaus ProjectB. Operating
WiresharkWireshark FoundationB. Operating
MetasploitRapid7B. Operating
TOR Node Listdan.me.ukB. Operating
Workbook on Security: Practical Steps for Human Rights Defenders at RiskFrontline DefendersB. Operating
Online Harassment Field ManualPen AmericaB. Operating

Legend

The organizations responsible for each solution are represented by the following color-coded entity types

Nonprofit
Academia
Government Agency
Intergovernmental Organization
Commercial
ISAC/ISAO
SDO
Individual or Group of Volunteers

Join Us

Click below for our recent efforts and to sign up for upcoming news