Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

TrustLogix TrustAccess

TrustLogix TrustAccess

language

Identity Governance and Administration

TrustLogix TrustAccess on SecurityListing: Data access governance platform enforcing least-privilege across data platforms

4.3(2)
Binary Ninja

Binary Ninja

language

Digital Forensics and Incident Response

Binary Ninja on SecurityListing: Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

4.3(2)
Operating System Based Redirection with Apache mod_rewrite

Operating System Based

language

Offensive Security

Operating System Based Redirection with Apache mod_rewrite on SecurityListing: Detect users' operating systems and perform redirection with Apache mod_rewrite.

4.3(2)
Huntress Managed Security Awareness Training

Huntress Managed Security

language

Security Awareness Training

Huntress Managed Security Awareness Training on SecurityListing: Managed security awareness training with threat intel-based content & phishing sims

4.3(2)
FullHunt

FullHunt

language

External Attack Surface Management

FullHunt on SecurityListing: FullHunt is a next-generation attack surface security platform that enables companies to discover, monitor, and secure their external attack surfaces.

4.3(2)
Coro Platform

Coro Platform

language

Data Loss Prevention

Coro Platform on SecurityListing: Unified cybersecurity platform with multiple security modules and single agent

4.3(2)
PTJunior

PTJunior

language

Offensive Security

PTJunior on SecurityListing: AI agent that autonomously discovers, exploits, and documents vulnerabilities.

4.3(2)
Attic M365 FREE

Attic M365 FREE

language

Anti-Phishing

Attic M365 FREE on SecurityListing: Protects Microsoft 365 users from phishing attacks using fake login pages

4.3(2)
Hardwear.io Conference 2018

Hardwear.io Conference 2018

language

Guides

Hardwear.io Conference 2018 on SecurityListing: Recorded talks from the Hardwear.io Conference 2018 covering various hardware security topics.

4.3(2)
Forensic Registry EDitor (FRED)

Forensic Registry EDitor

language

Digital Forensics and Incident Response

Forensic Registry EDitor (FRED) on SecurityListing: A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.

4.3(2)
Maltiverse

Maltiverse

language

Threat Intelligence Platforms

Maltiverse on SecurityListing: Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.

4.3(2)
ITRenew

ITRenew

United States flag

Security Operations

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services. Our mission is to help data center clients eliminat

4.3(2)
Netdude

Netdude

language

Digital Forensics and Incident Response

Netdude on SecurityListing: Network Dump data Displayer and Editor framework for tcpdump trace files manipulation.

4.3(2)
Google Cloud Security

Google Cloud Security

language

Cloud Security Posture Management

Google Cloud Security on SecurityListing: Cloud security platform with controls for workload protection and compliance

4.3(2)
Cloud Networks

Cloud Networks

United Arab Emirates flag

Cloud Security

Cloud Networks Solutions DMCC is a system integrator and IT security provider established in 2015, offering hardware and software sales, IT auditing and consulting, and design and implementation of in

4.3(2)
Devo Platform

Devo Platform

language

Threat Intelligence Platforms

Devo Platform on SecurityListing: Integrated SIEM, SOAR, and UEBA platform with AI-driven threat detection

4.3(2)
Metasploit Unleashed

Metasploit Unleashed

language

Penetration Testing

Metasploit Unleashed on SecurityListing: Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

4.3(2)
Tstat

Tstat

language

Network Detection and Response

Tstat on SecurityListing: Passive sniffer tool for analyzing traffic patterns.

4.3(2)
IONIX External Exposure Management

IONIX External Exposure

language

Exposure Management

IONIX External Exposure Management on SecurityListing: External attack surface mgmt platform for discovering & remediating exposures

4.3(2)
ModbusPal

ModbusPal

language

Industrial Control System Security

ModbusPal on SecurityListing: Java MODBUS simulator with scriptable functions and dynamic resource creation.

4.3(2)
Showing 2081 to 2100 of 4175 products