cyberhelp
Search...
Ctrl
K
main
shop
More
Tools
Useful cybersecurity tools for quick reference
Previous
Deploy an ICE-BCS instance
Next
Scripts
Last updated
28 days ago
Enterprise Application ID reference
IR Tools - M365 extractor
Security Alerts Index
NIST CSF 2.0 Reference Tool
Connectwise Security
CISA Known Exploited Vulnerability Search
Draw.io
CVE Partner Search
NIST Vulnerability Database Search
Threat Intelligence Platform
IPStack
DNS Dumpster
CyberChef - GCHQ Cyber Swiss Army Knife
M356maps
CIS Top 18 controls
Microsoft 365 Application IDs - BEC Investigation Resources - ByteIntoCyber
ByteIntoCyber
Check those apps!
Great for data flow, network diagram creation. Local file storage support.
Microsoft Extractor Suite documentation! — Microsoft-Extractor-Suite 3.0.1 documentation
Get those logs!
Western Networks Inc.
Access CPRT - Cybersecurity and Privacy Reference Tool | CSRC | CSRC
CSRC | NIST
Teriffic Product
Cybersecurity | ConnectWise Blog
Company specific security info for large vendors is good to track in your industry.
Known Exploited Vulnerabilities Catalog | CISA
If you find it here, patch it Yesterday!
Flowchart Maker & Online Diagram Software
CVE Website
Use in risk analysis, register work
NVD - Search and Statistics
Use in risk analysis, register work
Threat Intelligence Platform (TIP) | Integrate #1 Cyber Threat Intel APIs
Investigative IP/domain lookup tool
Explore IP Geolocation with Ipstack - Get Started Today
Source IPv4/v6 threat intelligence
https://dnsdumpster.com/
dnsdumpster.com
Investigative tool
CyberChef
Excellent regex helper - courtesy of British Intelligence!
Microsoft 365 Licensing
M365 Maps
Great visualization of what products are included across various Microsoft product levels
The 18 CIS Controls
CIS
Don't have any best practices? Start with some of the Top recommendations from the Center for Internet Security.