Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Labaton Sucharow

Security Operations
Labaton Sucharow prosecutes precedent-setting class and direct actions, recovering billions of dollars on behalf of defrauded consumers and investors. Standing on the horizon of law and technology, o

Industrial Defender

Industrial Control System Security
Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint. Industrial Defender ASM collects both config

AttackRuleMap
Threat Hunting
AttackRuleMap on SecurityListing: A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.

International Accreditation Forum

Security Operations
The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment which reduces risk for business

CrowdStrike Falcon Platform
Endpoint Detection and Response
CrowdStrike Falcon Platform on SecurityListing: Cloud-native cybersecurity platform with EPP, EDR, XDR, and SIEM capabilities

Cytrusst Cyber Attack
Brand Protection
Cytrusst Cyber Attack Surface Management on SecurityListing: Attack surface management platform with dark web & brand monitoring capabilities

LeakIX
Offensive Security
LeakIX on SecurityListing: LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.

Loading Alternate Data
Offensive Security
Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker on SecurityListing: Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.

Company Name GoldPhish
Security Awareness Training
Company Name GoldPhish on SecurityListing: Security awareness training and phishing simulation platform

Google BeyondCorp
VPN
Google BeyondCorp on SecurityListing: Google's zero trust implementation for secure access without VPN

ZeroNorth

Governance Risk and Compliance Platforms
ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs. Our “mission-co

HTB Academy
Threat Intelligence Platforms
HTB Academy on SecurityListing: HTB Academy offers guided cybersecurity training with industry certifications to help you become a market-ready professional.

Cloudmersive Virus Scan
Endpoint Protection Platform
Cloudmersive Virus Scan on SecurityListing: Cloud-based virus scan APIs for securing files, URLs, and content uploads with advanced anti-virus and malware scanning capabilities.

Accutive Security
Key Management
Accutive Security on SecurityListing: Cryptography and IAM consulting services with PKI and certificate mgmt.

CYE Solvo
Cloud Security Posture Management
CYE Solvo on SecurityListing: Cloud security posture management platform for risk identification

LEPHISH

Security Awareness Training
LePhish is a French cybersecurity solution specializing in automated phishing campaigns. Through realistic and tailored scenarios, we help your employees recognize and avoid cyberattacks and intrusion

Randomized Malleable C2
Penetration Testing
Randomized Malleable C2 Profiles Made Easy on SecurityListing: Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

OWASP API Security
API Security
OWASP API Security Top 10 on SecurityListing: A community website for API security news, vulnerabilities, and best practices

Proxmark 3
Offensive Security
Proxmark 3 on SecurityListing: The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.

edb
Digital Forensics and Incident Response
edb on SecurityListing: edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.