Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Wireguard

Wireguard

language

VPN

Wireguard on SecurityListing: Fast, simple, and secure VPN that uses cutting-edge cryptography

RoboShadow OWASP ZAP Vulnerability Scanner

RoboShadow OWASP ZAP

language

Vulnerability Assessment

RoboShadow OWASP ZAP Vulnerability Scanner on SecurityListing: Web app & network vulnerability scanner integrating OWASP ZAP, Shodan & Nmap

Internacious Website and Email Security Scan

Internacious Website and

language

Security Scanning

Internacious Website and Email Security Scan on SecurityListing: Web and email security scanner that checks 16 critical security points in 60 seconds

Invicti DAST

Invicti DAST

language

API Security

Invicti DAST on SecurityListing: DAST scanner with proof-based vulnerability validation and CI/CD integration

UPX

UPX

language

Offensive Security

UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.

Using a SCF file to Gather Hashes

Using a SCF

language

Offensive Security

Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

DDE attack with PowerShell Empire

DDE attack with

language

Offensive Security

DDE attack with PowerShell Empire on SecurityListing: Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.

Mandos Brief

Mandos Brief

language

Threat Intelligence Platforms

Mandos Brief on SecurityListing: Weekly cybersecurity newsletter covering security incidents, AI, and leadership

Western Balkans Cyber Capacity Centre (WB3C)

Western Balkans Cyber

ME flag

Security Operations

WB3C is a regional programme founded by France, Slovenia and Montenegro with the mission of building a secure and connected Western Balkans region through enhancing its cyber capabilities and resilien

Oneleet Cybersecurity & Compliance Platform

Oneleet Cybersecurity &

language

Compliance Management

Oneleet Cybersecurity & Compliance Platform on SecurityListing: Automated compliance and security platform for SOC 2, ISO 27001, and HIPAA

Password Storage - OWASP Cheat Sheet Series

Password Storage -

language

Cheat Sheets

Password Storage - OWASP Cheat Sheet Series on SecurityListing: Guidelines and best practices for securely storing passwords.

Sigma Query

Sigma Query

language

Threat Hunting

Sigma Query on SecurityListing: Searchable repository of Sigma detection rules for threat hunting and SIEM

Slavehack 2

Slavehack 2

language

Cyber Range Training

Slavehack 2 on SecurityListing: Online hacking game with realistic hacking experience and player interaction.

snmpcheck

snmpcheck

language

Offensive Security

snmpcheck on SecurityListing: A tool for enumerating information via SNMP protocol.

Risksurface

Risksurface

language

Risk Assessment

Risksurface on SecurityListing: SaaS platform for attack surface management and vulnerability detection

syslog-ng

syslog-ng

language

Security Information and Event Management

syslog-ng on SecurityListing: A log management solution that optimizes SIEM performance, provides rapid search and troubleshooting, and meets compliance requirements.

Mandos Fractional CISO

Mandos Fractional CISO

language

Risk Assessment

Mandos Fractional CISO on SecurityListing: Fractional CISO services for B2B companies to build security programs

NERC Alerts

NERC Alerts

language

Blogs and News

NERC Alerts on SecurityListing: Receive important notifications and updates related to North American electric grid security.

Wallarm Cloud-Native WAAP

Wallarm Cloud-Native WAAP

language

API Security

Wallarm Cloud-Native WAAP on SecurityListing: Cloud-native WAAP protecting web apps & APIs against OWASP Top 10 & threats

Social Engineering Attacks

Social Engineering Attacks

language

Security Awareness Training

Social Engineering Attacks on SecurityListing: A reminder that technology alone is not enough to stay secure against social engineering tactics.

Showing 3241 to 3260 of 4175 products