CISA’s 150+ List of Free Services and Tools
CISA has a MASSIVE list of free services and tools you can and should take advantage of.
CISA has a MASSIVE list of free services and tools you can and should take advantage of.
Website: https://lastpass.com/howsecure.php This tool is similar to the other password checkers I have listed, such as How Secure is my Password? and Password Monster. This one is fine and gets…
Website: https://www.eicar.org/?page_id=3950 The EICAR anti-malware test file is a harmless file that is used to test the effectiveness of anti-malware software. It was created by the European Institute for Computer…
Website: https://www.tenable.com/whitepapers/nist-csf-implementation-planning-tool The NIST Cybersecurity Framework (CSF) is a comprehensive set of guidelines for managing cybersecurity risk in organizations. The NIST CSF Implementation Planning Tool, developed by Tenable, provides a…
Website: https://cyber-leaks.com Cyber Leaks is a breach checker website where you can validate the following types of information: 1. Email leaks – was your email found in leaked email records?…
Website: https://haveibeenpwned.com HaveIBeenPwned.com (HIBP) is a website, maintained by Troy Hunt, that allows users to check whether their personal information has been compromised in known data breaches. Here is a…
Website: https://www.security.org/how-secure-is-my-password/ Security.org’s “How Secure Is My Password?” is a free online tool that allows users to check the strength and security of their passwords. Here’s a summary of the…
Website: https://www.passwordmonster.com/ Similar to “How Secure is my Password”, this tool is offered by My1Login. Plug in your password (or a similar proxy) and get this info: 1. Password strength…
Website: https://gitlab.com/syntax-ir/playbooks/-/tree/main GitLab open sourced their playbooks for Incident Response as a way to give back to the community. It gives us procedural documentation, flowcharts, and activities you can adopt,…
Website: http:///cve.mitre.org This is the list of common vulnerabilities and exposures (CVE) that everyone knows and loves. There is one CVE Record for each vulnerability in the catalog. The vulnerabilities…