Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

IO Wargame
Cyber Range Training
IO Wargame on SecurityListing: Frontpage of the IO wargame with various versions and connection details.

PhotoRec
Digital Forensics and Incident Response
PhotoRec on SecurityListing: A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.

Yoti

Security Operations
Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies. We’re working together to fix an outdated identity system. We be

HoneyView
Security Operations
HoneyView on SecurityListing: HoneyView is a tool for analyzing honeyd logfiles graphically and textually.

RAD Security RAD
Security Orchestration Automation and Response
RAD Security RAD FusionAI Core on SecurityListing: AI-powered security platform that correlates signals & automates actions

Highlighter
Threat Hunting
Highlighter on SecurityListing: Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.

Graylog
Security Information and Event Management
Graylog on SecurityListing: Graylog offers advanced log management and SIEM capabilities to enhance security and compliance across various industries.

Grep App
Threat Hunting
Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

DiskShadow
Offensive Security
DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

InfoSight

Compliance Consulting
InfoSight offers proven Cyber Security, Regulatory Compliance, Risk Management and Infrastructure Solutions to protect your business and your customers from cyber crime and fraud. We are a Cyber Secu

Lumifi Network Detection
Managed Detection and Response
Lumifi Network Detection & Response (NDR) on SecurityListing: Managed NDR service monitoring network traffic for threats via co-managed model

Proxmark III
Offensive Security
Proxmark III on SecurityListing: A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

H3C U-Center Unified
Security Information and Event Management
H3C U-Center Unified O&M Cloud on SecurityListing: Unified O&M cloud platform for network and IT infrastructure management

Shuffler
Security Orchestration Automation and Response
Shuffler on SecurityListing: Shuffle Automation provides an open-source platform for security orchestration, automation, and response.

Explorer Suite
Digital Forensics and Incident Response
Explorer Suite on SecurityListing: A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

Valkyrie Comodo
Digital Forensics and Incident Response
Valkyrie Comodo on SecurityListing: Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
Detecting Lateral Movement
Digital Forensics and Incident Response
Detecting Lateral Movement through Tracking Event Logs (Version 2) on SecurityListing: A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.

GNU Binutils
Digital Forensics and Incident Response
GNU Binutils on SecurityListing: A collection of binary tools for various purposes including linking, assembling, profiling, and more.

Guide to Ethical
Offensive Security
Guide to Ethical Hacking on SecurityListing: A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

Logz.io Log Management
Security Information and Event Management
Logz.io Log Management on SecurityListing: Cloud-based log management platform with AI-driven analysis and observability