Dr. Eric Lynn David


Illustrations Publications Productions Cybersecurity


  • artwork
  • Publications
  • MUSIC
    • YouTube Channel
    • Bandcamp Page
  • Martial Arts
    • Background
    • Lineage
    • Youtube Channel
  • cybersecurity
    • Cybersecurity Tools
    • Simulation
    • Assessment
    • Youtube Channel
  • Data Analysis
    • My GitHub
    • US Economy
    • Covid stats
    • COVID ANALYTICS
    • My w3schools Profile
  • ABOUT

cybersecurity tools and resources





news * intel * training



  • KrebsonSecurity
  • Infosec Exchange
  • CISA (free services/tools)
  • Hacker News
  • Dark Reading
  • Bleeping Computer
  • Infosecurity Magazinne
  • Security Week
  • Schneir on Security
  • Threatpost
  • RecordedFuture


  • Deep Learning w/Python
  • Hack the Box
  • US Cyber Games
  • ISACA (CISM)
  • SBS Institute
  • OffSec (Kali)
  • ISC2
  • CISSP (Cybrary)
  • SANS.org
  • Palo Alto
  • w3schools (Cybersecurity)
  • w3schools (Python)
  • Black Hat
  • DEF Con
  • RSA Conference
  • SANS Summits
  • ShmooCon
  • BSides


network & web



  • IP Lookup (speedguide.net)
  • GRC ShieldsUP!
  • GRC Nameserver Spoofability Test
  • GRC Router Crash Test
  • TLS Email Checker
  • TLS Server Tester
  • ARIN
  • MX Toolbox
  • Outage.Report
  • DownDetector
  • Blacklist Check (CleanTalk)
  • Spamhaus Project
  • Wireshark OUI Lookup
  • Register.com (domain lookup)
  • Port Lookup (speedguide.net)
  • AngryIP Scanner (open source)
  • URLquery
  • Snort (AppDevSec)
  • Suricata
  • NMAP
  • Wireshark (downloads)


  • IP Subnet Calculator
  • Speedtest.net
  • ATT Speedtest
  • Radar (Qrator.net)
  • Autonomous System Lookup
  • Criminal IP Domain Search
  • RIPE
  • NirSoft
  • PageSpeed Insights
  • CSS Tricks




risk threat vulnerability



  • Internet Storm Center (SANS)
  • Talos (Cisco)
  • CISA.gov
  • ZeroDay Initiative (TrendMicro)
  • CIS
  • CIS 18 Critical Controls
  • Cybercrime Tracker
  • CVSS
  • CVE Search List
  • MiTRE ATT&CK
  • SSL Server Test (Qualys)
  • SSL Cert Test (ImmuniWeb)
  • SSH Check (Rebex)
  • Exploit Database
  • Software Vuln Search (vendors)
  • Software/Hardware Vendor Search
  • Advanced Vulnerability Search
  • Vuldb
  • Rapid7 Vuln & Exploit Database
  • Cisco Security Advisories
  • NVD (NIST) Vulnerability Search
  • Broadcom VMware Sec Advisories
  • Have I Been Pwned
  • Kb4 Email Server Exposure Check
  • MS Product Services Lifecycle
  • VirusTotal (file, url, serach)
  • Snyk Vuln DB (AppDevSec)
  • OpenCTI (open source)
  • Open SAMM (AppDevSec)
  • Woorank (AppDev)


testing & simulations



  • Free SSN Generator | SSN-Verify.com
  • Fake Credit Card Generator | CreditCardValidator
  • iFakeTextMessage
  • DLP Test
  • Cisco Umbrella DLP Sample Data
  • Sensitive Data Protection (Google)
  • Cisco DLP Email Security
  • DLP Sample Data Tests (Cisco)
  • Steganography (text to image)
  • Steganography
  • Steganography
  • Steganography (ManyTools)
  • Sensitive Data Classifications
  • Open Threat Exchange (OTX) | AT&T Cybersecurity
  • Download Anti Malware Testfile – Eicar
  • Microsoft Threat Modeling Tool
  • MD5 Hash Generator
  • InternetBadGuys (Cisco)
  • ExampleAdultSite (Cisco)
  • Umbrella Site Block Test (Cisco)
  • SSL OpenDNS Test (Cisco)
  • Eicar (malware test file)
  • Wicar (malware tests)
  • Browserling (sandbox)


malware & forensics



  • Malware Analysis
  • File Extension Lookup (file.net)
  • Should I Remove It
  • Joe Sandbox (basic)
  • No More Ransom
  • Thor Lite (downloads)
  • Cuckoo
  • Zeek
  • Volatility
  • FireEye
  • Recuva (downloads)
  • Autopsy (download)
  • Microsoft Log Parser (download)
  • Splunk (downloads)
  • MISP
  • Ghidra


data & gen ai



  • SQL Keywords (reference)
  • DTEX (DLP)
  • Cyberhaven (DLP)
  • M365 Purview (DLP)


  • AI Project
  • Faceswap (face)
  • Remaker (face)
  • FaceSwapper (face)
  • DeepFace Lab (face)
  • ElevenLabs (voice)
  • Speechify (voice)
  • TTS (voice)
  • PyTorch (model training)
  • TensorFlow (Google neural networks)
  • GANs (core models)
  • Hugging Face (learning model hub)


osint



  • OSINT Framework
  • URLscan.io
  • DIG Web Interface
  • Shodan (subscription)
  • People by Name
  • Maltego
  • SpiderFoot
  • theHarvester (download)


red team



  • Kali Downloads
  • VMWare (downloads)
  • MD5 Hash Generator
  • CrackStation (hashes)
  • Online Reverse Hash Lookup
  • URL Fuzzer
  • Website Recon
  • Google Hacking (Dorks)
  • WAF Detector (subscription)
  • DNS Dumpster
  • Domain Finder
  • Subdomain Finder
  • Find Virtual Hosts
  • Wordpress Scanner
  • Website Vulnerability Scanner
  • Network Vulnerability Scanner
  • Port Scanner (Nmap)
  • Atomic Red Team
  • iFake Text Message
  • ZAP (AppDevSec)
  • GraphQL
  • OpenVAS (AppDevSec)
  • Trivy (AppDevSec)
  • Metasploit
  • Cobalt Strike
  • Empire
  • TrustedSec (pentesters)
  • Pi-hole
  • Kali Exploitation Tools
  • Skipfish


  • Flipper Zero
  • Bleshark Nano (kickstarter)
  • Hacking Gadget (kickstarter)




blue team



  • GRC Password Haystacks
  • GRC Fingerprints
  • GRC Perfect Passwords
  • Hasso-Plattner Identity Leak Check
  • .Security Onion (downloads)
  • Windows Sandbox
  • Oracle VirtualBox
  • MAC Address Lookup
  • MAC Address Lookup.io
  • VIN Decoder (physical sec)
  • Wazuh
  • Palo Alto XSOAR


disclaimer



Legal Disclaimer The information and links provided on this website are for informational and educational purposes only. They are not intended to be a substitute for professional advice, and you should not rely on them as such. The tools and resources listed are commonly used in the cybersecurity industry for legitimate and ethical purposes, such as penetration testing, security auditing, and academic research. By using the information and tools provided on this site, you acknowledge and agree that: The use of these tools, technologies, and resources is entirely at your own risk. You are solely responsible for ensuring that your use of these tools complies with all applicable laws and regulations in your jurisdiction. The owner of this website is not responsible for any misuse of the information or tools listed here, nor for any damages or consequences that may arise from their use. This website and its content are provided on an "as is" basis, without any warranties of any kind, either express or implied. You are responsible for obtaining the necessary permissions and authorization before conducting any security testing on a network or system that you do not own.



(C) 2023 UPDATED 2025



Website and Content Dr. Eric David