Individuals
Have I Been Pwned
Authy
App for two-factor authentication to protect online accounts.
authy.com
Bitwarden
Free password manager for secure storage.
bitwarden.com
Malwarebytes
Free malware protection and scanner.
malwarebytes.com
Civil Society Organizations (CSOs)
Tails
Portable OS that provides secure, anonymous communications.
tails.boum.org
Tor Browser
Privacy-focused web browser for secure, anonymous browsing.
torproject.org
Signal
Encrypted messaging app for secure communication.
signal.org
Tella
App for securely documenting evidence.
tella-app.org
ProtonMail
Encrypted email service with high privacy standards.
protonmail.com
Independent Media
CrowdSec
Collaborative, open-source protection tool for real-time threat detection and reporting.
crowdsec.net
SecureDrop
Open-source tool for securely receiving documents from anonymous sources, ideal for journalists.
securedrop.org
Matomo
Privacy-oriented analytics tool for tracking website engagement securely.
matomo.org
Tella
App for securely documenting evidence.
tella-app.org
Cloudflare DDoS
Free DDoS protection to shield websites from online attacks.
cloudflare.com
Guide for Digital Security
Small and Medium Enterprises (SMEs)
Cyber Essentials
Framework from UK NCSC covering essential cybersecurity measures.
ncsc.gov.uk/cyberessentials
Qualys Community
Free vulnerability scanning for small businesses.
qualys.com
CIS Controls
Best practices guide from the Center for Internet Security to protect against common threats.
cisecurity.org
VPN - NordVPN
Reliable VPN service with high privacy standards.
nordvpn.com
OpenVAS
Open-source network vulnerability scanner for security assessments.
greenbone.net
Cybersec i IR teams
Battle Cards
CSEC Battle Cards are a free resource to help your cybersecurity team to protect your data and defend against potential cyber attacks.
TheHive
Open-source incident response platform for collaborative investigation and tracking of incidents.
Cuckoo Sandbox
Open-source automated malware analysis system that helps identify and understand malware behavior.
E-signature
E-signature in Bosnia and Herzegovina
Read article
DDoS
DDoS Attacks prevention
MISP
Open-source threat intelligence platform for sharing, storing, and correlating Indicators of Compromise (IOCs) for threat analysis.
YARA
Tool for identifying and classifying malware by creating rules to recognize patterns in binary files.
Mikrotik
Mikrotik devices hardening
Download guide
Velociraptor
Endpoint visibility tool focused on incident response, hunting, and forensic analysis, useful for detecting and responding to threats.
Intrusions&Impacts
Reinventing Cyber-Security Training
START