Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Understanding Docker container
Container Security
Understanding Docker container escapes on SecurityListing: Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.

Whitehats Data Privacy
Data Classification
Whitehats Data Privacy Solution on SecurityListing: Data privacy & GRC platform with DSPM, compliance automation, and risk mgmt.

Securden Unified PAM
Privileged Access Management
Securden Unified PAM on SecurityListing: A powerful tool that enables organizations to discover, manage, and secure privileged access, helping to reduce the risks associated with privileged accounts and activities.

Reversing With Lena
Guides
Reversing With Lena (Tutorials) on SecurityListing: Educational resources for reverse engineering tutorials by lena151.

SteelCon 2018
Industry Reports
SteelCon 2018 on SecurityListing: Cybersecurity conference featuring talks on various hacking topics by industry experts.

Unotech Cymmetri
Identity Governance and Administration
Unotech Cymmetri on SecurityListing: Enterprise IAM platform for identity management and access control

Virustotal
Threat Intelligence Platforms
Virustotal on SecurityListing: Analyze suspicious files, domains, IPs, and URLs to detect malware and other breaches, and share results with the security community.

win10upgrade
Threat Intelligence Platforms
win10upgrade on SecurityListing: MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.

Verity
Compliance Management
Verity on SecurityListing: Verity is a comprehensive compliance management tool that helps organizations manage their governance, risk, and compliance initiatives.

Project Honey Pot
Security Operations
Project Honey Pot on SecurityListing: The Web's Largest Community Tracking Online Fraud & Abuse

RiskXchange Attack Surface
Risk Assessment
RiskXchange Attack Surface Management on SecurityListing: Attack surface management platform for monitoring vulnerabilities and breaches

Sweet Runtime CNAPP
API Security
Sweet Runtime CNAPP on SecurityListing: Runtime CNAPP unifying cloud, workload, and app security with detection & response

TrojAI Defend
Data Loss Prevention
TrojAI Defend on SecurityListing: AI firewall for runtime protection of AI models, applications, and agents

SAFE Smart Tiering
Risk Assessment
SAFE Smart Tiering AI Agent on SecurityListing: AI agent that auto-classifies and updates vendor tiers in real-time for TPRM

Mandos Cyber Strategy
Guides
Mandos Cyber Strategy OS on SecurityListing: Curated cybersecurity frameworks, templates & guides for security programs

OWASP Bricks
Penetration Testing
OWASP Bricks on SecurityListing: Deliberately vulnerable web application for security professionals to practice attack techniques.

PF_RING ZC (Zero
Network Detection and Response
PF_RING ZC (Zero Copy) on SecurityListing: High-performance packet capture library with zero copy functionality.

Protiviti Artificial Intelligence
Risk Assessment
Protiviti Artificial Intelligence on SecurityListing: Global business consulting firm offering AI and risk management services

Symmetry Systems DataGuard
Data Classification
Symmetry Systems DataGuard on SecurityListing: DSPM platform for data discovery, classification, access control, and AI governance

Security Trainings
Guides
Security Trainings on SecurityListing: Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.