Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

PEview

PEview

language

Digital Forensics and Incident Response

PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

4.7(2)
Imprivata Vendor Privileged Access Management

Imprivata Vendor Privileged

language

Privileged Access Management

Imprivata Vendor Privileged Access Management on SecurityListing: Manages third-party vendor privileged access with Zero Trust controls

4.7(2)
DenyHosts

DenyHosts

language

Intrusion Detection and Prevention Systems

DenyHosts on SecurityListing: DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.

4.7(2)
Wappalyzer

Wappalyzer

language

External Attack Surface Management

Wappalyzer on SecurityListing: A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.

4.7(2)
Art of Memory Forensics

Art of Memory

language

Digital Forensics and Incident Response

Art of Memory Forensics on SecurityListing: A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.

4.7(2)
IronNet Collective Defense

IronNet Collective Defense

language

Threat Intelligence Platforms

IronNet Collective Defense on SecurityListing: AI-driven NDR platform enabling real-time threat intelligence sharing across orgs

4.7(2)
Fortinet FortiClient

Fortinet FortiClient

language

Endpoint Detection and Response

Fortinet FortiClient on SecurityListing: Unified endpoint agent providing ZTNA, VPN, EPP, and fabric integration

4.7(2)
FortiRecon

FortiRecon

language

Threat Intelligence Platforms

FortiRecon on SecurityListing: FortiRecon is a SaaS-based Continuous Threat Exposure Management service that combines Attack Surface Management, Brand Protection, and Adversary Centric Intelligence to provide visibility into internal and external risks for early threat detection and response.

4.7(2)
Certstream

Certstream

language

Brand Protection

Certstream on SecurityListing: Real-time monitoring tool for newly issued SSL certificates.

4.7(2)
CRT sh

CRT sh

language

Certificate Lifecycle Management

CRT sh on SecurityListing: Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

4.7(2)
Liquid C2 Cyber Defence Services

Liquid C2 Cyber

language

Managed Security Service Providers

Liquid C2 Cyber Defence Services on SecurityListing: Managed cyber defense services for threat detection and response

4.7(2)
TechLine

TechLine

EG flag

GRC

TechLine is an IT services provider in Egypt that enables FinTechs with IT operations, professional IT consultation, and security/compliance services. The company positions itself as a digital transfo

4.7(2)
ID North Managed Security Services

ID North Managed

language

Privileged Access Management

ID North Managed Security Services on SecurityListing: A managed security service provider specializing in identity security solutions including IAM, IGA, and PAM with implementation, operational, and advisory services.

4.7(2)
ResponseHub Security Questionnaires

ResponseHub Security Questionnaires

language

Risk Assessment

ResponseHub Security Questionnaires on SecurityListing: AI-powered platform for automating security questionnaire responses

4.7(2)
Ampliphae

Ampliphae

United Kingdom flag

Cloud Security

4.7(2)
BadCyber

BadCyber

language

Blogs and News

BadCyber on SecurityListing: A curated list of important security news, helping readers stay up-to-date with the latest developments in cybersecurity.

4.7(2)
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

Cobalt Strike HTTP

language

Offensive Security

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

4.7(2)
D3 Morpheus AI SOC

D3 Morpheus AI

language

Threat Intelligence Platforms

D3 Morpheus AI SOC on SecurityListing: AI-driven SOC platform for automated alert triage, investigation, and response

4.7(2)
Honeyd Tools

Honeyd Tools

language

Security Operations

Honeyd Tools on SecurityListing: A collection of tools that can be used with Honeyd for data analysis or other purposes

4.7(2)
JupiterOne Cyber Asset Attack Surface Management

JupiterOne Cyber Asset

language

Exposure Management

JupiterOne Cyber Asset Attack Surface Management on SecurityListing: Platform for cyber asset attack surface mgmt with asset visibility & control

4.7(2)
Showing 181 to 200 of 4175 products