Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Knostic

Security Operations
Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

WeChall
Cyber Range Training
WeChall on SecurityListing: A free online wargame for practicing hacking skills and learning security concepts.
Tracking a stolen
Digital Forensics and Incident Response
Tracking a stolen code-signing certificate with osquery on SecurityListing: Detect signed malware and track stolen code-signing certificates using osquery.

Trust Direction: An
Offensive Security
Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

Steghide
Digital Forensics and Incident Response
Steghide on SecurityListing: Steghide is a steganography program for hiding data in image and audio files.

ResourcesExtract
Digital Forensics and Incident Response
ResourcesExtract on SecurityListing: Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files

WayBackMachine
Digital Forensics and Incident Response
WayBackMachine on SecurityListing: A digital archive of the internet, allowing users to capture and browse archived web pages.

ThreatQuotient ThreatQ Platform
Threat Hunting
ThreatQuotient ThreatQ Platform on SecurityListing: Threat intelligence platform for detection, investigation, and response

Troy Hunt
Offensive Security
Troy Hunt on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

ThisisLegal.com
Cyber Range Training
ThisisLegal.com on SecurityListing: Hacker wargames site with forums and tutorials, fostering a learning community.

Team Cymru Pure
Threat Hunting
Team Cymru Pure Signal™ Scout on SecurityListing: Real-time threat intelligence platform for external threat visibility and IoC analysis

SOAR
Threat Hunting
SOAR on SecurityListing: A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.

snmpcheck
Offensive Security
snmpcheck on SecurityListing: A tool for enumerating information via SNMP protocol.

Slavehack 2
Cyber Range Training
Slavehack 2 on SecurityListing: Online hacking game with realistic hacking experience and player interaction.

Sigma Query
Threat Hunting
Sigma Query on SecurityListing: Searchable repository of Sigma detection rules for threat hunting and SIEM

DDE attack with
Offensive Security
DDE attack with PowerShell Empire on SecurityListing: Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.

Using a SCF
Offensive Security
Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

UPX
Offensive Security
UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.

Project Honey Pot
Security Operations
Project Honey Pot on SecurityListing: The Web's Largest Community Tracking Online Fraud & Abuse

Radiant Agentic AI
Threat Hunting
Radiant Agentic AI on SecurityListing: AI-powered SOC platform for automated alert triage, incident response & logging