Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
PEview
Digital Forensics and Incident Response
PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.
Imprivata Vendor Privileged
Privileged Access Management
Imprivata Vendor Privileged Access Management on SecurityListing: Manages third-party vendor privileged access with Zero Trust controls
DenyHosts
Intrusion Detection and Prevention Systems
DenyHosts on SecurityListing: DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.
Wappalyzer
External Attack Surface Management
Wappalyzer on SecurityListing: A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.
Art of Memory
Digital Forensics and Incident Response
Art of Memory Forensics on SecurityListing: A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.
IronNet Collective Defense
Threat Intelligence Platforms
IronNet Collective Defense on SecurityListing: AI-driven NDR platform enabling real-time threat intelligence sharing across orgs
Fortinet FortiClient
Endpoint Detection and Response
Fortinet FortiClient on SecurityListing: Unified endpoint agent providing ZTNA, VPN, EPP, and fabric integration
FortiRecon
Threat Intelligence Platforms
FortiRecon on SecurityListing: FortiRecon is a SaaS-based Continuous Threat Exposure Management service that combines Attack Surface Management, Brand Protection, and Adversary Centric Intelligence to provide visibility into internal and external risks for early threat detection and response.
Certstream
Brand Protection
Certstream on SecurityListing: Real-time monitoring tool for newly issued SSL certificates.
CRT sh
Certificate Lifecycle Management
CRT sh on SecurityListing: Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Liquid C2 Cyber
Managed Security Service Providers
Liquid C2 Cyber Defence Services on SecurityListing: Managed cyber defense services for threat detection and response
TechLine

GRC
TechLine is an IT services provider in Egypt that enables FinTechs with IT operations, professional IT consultation, and security/compliance services. The company positions itself as a digital transfo
ID North Managed
Privileged Access Management
ID North Managed Security Services on SecurityListing: A managed security service provider specializing in identity security solutions including IAM, IGA, and PAM with implementation, operational, and advisory services.
ResponseHub Security Questionnaires
Risk Assessment
ResponseHub Security Questionnaires on SecurityListing: AI-powered platform for automating security questionnaire responses
Ampliphae

Cloud Security
BadCyber
Blogs and News
BadCyber on SecurityListing: A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.
Cobalt Strike HTTP
Offensive Security
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.
D3 Morpheus AI
Threat Intelligence Platforms
D3 Morpheus AI SOC on SecurityListing: AI-driven SOC platform for automated alert triage, investigation, and response
Honeyd Tools
Security Operations
Honeyd Tools on SecurityListing: A collection of tools that can be used with Honeyd for data analysis or other purposes
JupiterOne Cyber Asset
Exposure Management
JupiterOne Cyber Asset Attack Surface Management on SecurityListing: Platform for cyber asset attack surface mgmt with asset visibility & control