Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Logpoint Director

Logpoint Director

language

Security Information and Event Management

Logpoint Director on SecurityListing: A centralized management console for efficiently operating and monitoring large-scale, multitenant Logpoint SIEM deployments across customers, geographies, and organizational divisions.

4.5(1)
hackxor

hackxor

language

Cyber Range Training

hackxor on SecurityListing: A platform offering hacking missions to test and enhance skills.

4.5(1)
HoneyDB

HoneyDB

language

Threat Hunting

HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

4.5(1)
Threat.Zone

Threat.Zone

language

Digital Forensics and Incident Response

Threat.Zone on SecurityListing: Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

4.5(1)
MFTECmd

MFTECmd

language

Digital Forensics and Incident Response

MFTECmd on SecurityListing: A command-line tool for managing and analyzing Microsoft Forefront TMG and UAG configurations.

4.5(1)
InQuest Labs

InQuest Labs

language

Threat Hunting

InQuest Labs on SecurityListing: The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.

4.5(1)
Google Cloud Incident Response Cheat Sheet

Google Cloud Incident

language

Threat Hunting

Google Cloud Incident Response Cheat Sheet on SecurityListing: A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.

4.5(1)
Daylight Threat Detection and Response

Daylight Threat Detection

language

Threat Hunting

Daylight Threat Detection and Response on SecurityListing: AI-powered MDR combining agentic AI with human expertise for threat detection

4.5(1)
GHH - Google Hack Honeypot

GHH - Google

language

Security Operations

GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

4.5(1)
Cylert-me

Cylert-me

EG flag

GRC

Cylert-me provides cybersecurity and information security consultations to organizations of all sizes across the Middle East, offering services such as penetration testing, security operations centers

4.5(1)
Anch.AI

Anch.AI

Sweden flag

Security Operations

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.

4.5(1)
Threatpost

Threatpost

language

Offensive Security

Threatpost on SecurityListing: Sysreptor offers a customizable reporting solution for penetration testing and red teaming.

4.5(1)
Paramount Assure

Paramount Assure

United Arab Emirates flag

Cloud Security

Paramount Assure is a Middle East–focused cybersecurity provider offering a broad range of services including managed security, governance risk and compliance, data privacy, and OT security. The compa

4.5(1)
Userland API Monitoring and Code Injection Detection

Userland API Monitoring

language

Digital Forensics and Incident Response

Userland API Monitoring and Code Injection Detection on SecurityListing: Explores malware interaction with Windows API and methods for detection and prevention.

4.5(1)
Bryan Cave LLP

Bryan Cave LLP

United States flag

Security Operations

Bryan Cave LLP is a global business and litigation law firm. We have over 1,100 lawyers located in 25 offices around the world. Practice areas include Data Privacy and Security.

4.5(1)
Cybool

Cybool

Israel flag

Governance Risk and Compliance Platforms

Cybool delivers Next-Gen Risk and Policy Management by transforming raw security data into actionable threat intel. Unlike traditional GRC solutions, Cybool integrates real-time threat intelligence d

4.5(1)
Knocknoc

Knocknoc

Australia flag

Security Operations

Knocknoc is a novel yet elegant approach to removing attack surface. Your infrastructure becomes invisible until users authenticate, eliminating pre-auth exposure across distributed IT and OT environ

4.5(1)
KryptoKloud

KryptoKloud

United Kingdom flag

Governance Risk and Compliance Platforms

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions. KryptoKloud was establishe

4.5(1)
Rewterz

Rewterz

United Arab Emirates flag

Application Security

Rewterz is a cybersecurity company that provides advanced defense and threat protection services to organizations worldwide. The company offers capabilities including XDR, threat intelligence, managed

4.5(1)
LastActivityView

LastActivityView

language

Digital Forensics and Incident Response

LastActivityView on SecurityListing: A tool that collects and displays user activity and system events on a Windows system.

4.5(1)
Showing 1281 to 1300 of 2606 products