Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Advisera 27001Academy

Advisera 27001Academy

Switzerland flag

Security Operations

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR. 27001Academy is one of the Academies

4.5(1)
Kirkland & Ellis

Kirkland & Ellis

United States flag

Security Operations

Kirkland & Ellis LLP is an international law firm with offices in the USA, Europe and Asia. Practice areas include Data Security & Privacy.

4.5(1)
ThreatConnect Polarity

ThreatConnect Polarity

language

Threat Hunting

ThreatConnect Polarity on SecurityListing: Overlay tool providing real-time threat intel & context across security tools

4.5(1)
FAMOC

FAMOC

Ireland flag

Security Operations

FAMOC is an enterprise mobile management solution that makes your job safer and more productive by delivering comprehensive security and management for applications, documents, email, and mobile devic

4.5(1)
Bait and Switch Honeypot

Bait and Switch

language

Security Operations

Bait and Switch Honeypot on SecurityListing: An active and aggressive honeypot tool for network security.

4.5(1)
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts

Executing Commands and

language

Offensive Security

Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts on SecurityListing: A blog post about bypassing AppLocker using PowerShell diagnostic scripts

4.5(1)
Reversing and Exploiting ARM Binaries: rwthCTF Trafman

Reversing and Exploiting

language

Offensive Security

Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

4.5(1)
Daniel Miessler/Unsupervised Learning

Daniel Miessler/Unsupervised Learning

language

Offensive Security

Daniel Miessler/Unsupervised Learning on SecurityListing: Sysreptor offers a customizable reporting solution for offensive security assessments.

4.5(1)
Positive Hack Days Fest

Positive Hack Days

language

Cyber Range Training

Positive Hack Days Fest on SecurityListing: International cybersecurity festival for all, who wants to dive into the world of cyber security and have a great time.

4.5(1)
CyberCPR

CyberCPR

language

Digital Forensics and Incident Response

CyberCPR on SecurityListing: Incident response and case management solution for efficient incident response and management.

4.5(1)
Contagio Mobile

Contagio Mobile

language

Digital Forensics and Incident Response

Contagio Mobile on SecurityListing: A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

4.5(1)
CrowdStrike Community Tools

CrowdStrike Community Tools

language

Digital Forensics and Incident Response

CrowdStrike Community Tools on SecurityListing: Free tools for the CrowdStrike customer community to support their use of the Falcon platform.

4.5(1)
Hunters Next-Gen SIEM

Hunters Next-Gen SIEM

language

Threat Hunting

Hunters Next-Gen SIEM on SecurityListing: Next-gen SIEM with AI-powered triage, automated investigation & detection

4.5(1)
Wiser Market

Wiser Market

United Kingdom flag

Brand Protection

Wiser Market is a leading company in global online brand protection services, intellectual property protection, anti-Counterfeit & trademark infringements. Whether you wish to fight counterfeiting, p

4.5(1)
SecurityScope

SecurityScope

EG flag

Application Security

SecurityScope offers hands-on cybersecurity training and penetration testing labs, providing immersive environments to practice real-world scenarios. The organization focuses on ethical hacking, vulne

4.5(1)
0xf.at Hackits

0xf.at Hackits

language

Cyber Range Training

0xf.at Hackits on SecurityListing: Solve password-riddles on a website without logins or ads.

4.5(1)
Indelible Data

Indelible Data

United Kingdom flag

Compliance Consulting

Indelible Data is an established information security and technology consultancy: enterprise security architecture, lead security project management, training and auditing with extensive experience of

4.5(1)
Prophet Security Prophet AI Threat Hunter

Prophet Security Prophet

language

Threat Hunting

Prophet Security Prophet AI Threat Hunter on SecurityListing: AI-driven threat hunting platform for SOC alert triage and investigation

4.5(1)
Grafana Cloud Logs

Grafana Cloud Logs

language

Security Information and Event Management

Grafana Cloud Logs on SecurityListing: Managed log aggregation system for storing and querying application logs

4.5(1)
Prophet Security Prophet AI SOC Analyst

Prophet Security Prophet

language

Security Orchestration Automation and Response

Prophet Security Prophet AI SOC Analyst on SecurityListing: AI-powered SOC analyst that automates alert triage and investigation

4.5(1)
Showing 1221 to 1240 of 2606 products