Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

IONIX

Security Operations
IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your real attack surface and its digital supply

Vconn

Cloud Security
Vconn is a cybersecurity-centric managed services provider with a focus on helping organizations enhance digital transformation and security posture. The company offers cybersecurity, devsecops, manag

Jupyter Notebooks for
Threat Hunting
Jupyter Notebooks for Threat Hunting on SecurityListing: Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.

GNU Netcat
Offensive Security
GNU Netcat on SecurityListing: A featured networking utility for reading and writing data across network connections with advanced capabilities.

TechTarget
Offensive Security
TechTarget on SecurityListing: Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.

CYGEN

Cloud Security
CYGEN is a cybersecurity company offering data-driven, customized security solutions to protect digital assets and ensure business continuity. With five years in operation, they serve clients across E

LogRythm SIEM
Security Information and Event Management
LogRythm SIEM on SecurityListing: LogRhythm SIEM is a comprehensive security information and event management platform that collects, analyzes, and responds to security events across an organization's IT infrastructure.

Verisys File Integirty
Security Information and Event Management
Verisys File Integirty Monitoring on SecurityListing: A next-generation file integrity monitoring and change detection system

IonX Verisys FIM
Security Information and Event Management
IonX Verisys FIM on SecurityListing: File integrity monitoring for Windows, Linux & network devices

RiskAnalytics Solutions Community
Threat Hunting
RiskAnalytics Solutions Community Projects on SecurityListing: RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.

Magnet ACQUIRE
Digital Forensics and Incident Response
Magnet ACQUIRE on SecurityListing: Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.

HoneyDrive
Security Operations
HoneyDrive on SecurityListing: HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

Intelligence-Driven Incident Response
Digital Forensics and Incident Response
Intelligence-Driven Incident Response on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.

State of Security
Offensive Security
State of Security on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

Purple Academy by
Cyber Range Training
Purple Academy by Picus on SecurityListing: Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.

Belkasoft X Forensic
Digital Forensics and Incident Response
Belkasoft X Forensic on SecurityListing: A reliable end-to-end DFIR solution for boosting cyber incident response and forensics capacity.

Binalyze AIR
Digital Forensics and Incident Response
Binalyze AIR on SecurityListing: Modern digital forensics and incident response platform with comprehensive tools.

Fabric Platform by
Security Information and Event Management
Fabric Platform by BlackStork on SecurityListing: Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.

Attic MDR
Threat Hunting
Attic MDR on SecurityListing: 24/7 managed detection and response service for Microsoft 365 environments

Incident Response with
Threat Hunting
Incident Response with Threat Intelligence on SecurityListing: A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.