Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

SecGame #1: Sauron

SecGame #1: Sauron

language

Penetration Testing

SecGame #1: Sauron on SecurityListing: A Linux-based environment for penetration testing and vulnerability exploitation

Securing NFS Red Hat Enterprise Linux 7

Securing NFS Red

language

Guides

Securing NFS Red Hat Enterprise Linux 7 on SecurityListing: Guidance on securing NFS in Red Hat Enterprise Linux 7

Supply Wisdom Continuous Monitoring

Supply Wisdom Continuous

language

Risk Assessment

Supply Wisdom Continuous Monitoring on SecurityListing: Continuous monitoring platform for third-party supplier and location risks

ThisisLegal.com

ThisisLegal.com

language

Cyber Range Training

ThisisLegal.com on SecurityListing: Hacker wargames site with forums and tutorials, fostering a learning community.

Troy Hunt

Troy Hunt

language

Offensive Security

Troy Hunt on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

Windows 7 UAC Whitelist Code-Injection Issue

Windows 7 UAC

language

API Security

Windows 7 UAC Whitelist Code-Injection Issue on SecurityListing: Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

Security Tips - Apache HTTP Server Version 2.4

Security Tips -

language

Guides

Security Tips - Apache HTTP Server Version 2.4 on SecurityListing: Security tips for setting up an Apache HTTP Server to prevent security issues.

tcpxtract

tcpxtract

language

Digital Forensics and Incident Response

tcpxtract on SecurityListing: A tool for extracting files from network traffic based on file signatures with support for various file formats and scalable search algorithm.

SAFE Intake Form AI Agent

SAFE Intake Form

language

Third-Party Risk Management

SAFE Intake Form AI Agent on SecurityListing: AI agent that automates vendor intake form parsing for TPRM onboarding

PowerUpSQL

PowerUpSQL

language

Penetration Testing

PowerUpSQL on SecurityListing: Tool for attacking Active Directory environments through SQL Server access.

Serving Random Payloads with Apache mod_rewrite

Serving Random Payloads

language

Penetration Testing

Serving Random Payloads with Apache mod_rewrite on SecurityListing: A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

ThreatQuotient ThreatQ Platform

ThreatQuotient ThreatQ Platform

language

Threat Hunting

ThreatQuotient ThreatQ Platform on SecurityListing: Threat intelligence platform for detection, investigation, and response

Tor Exit Addresses

Tor Exit Addresses

language

Threat Intelligence Platforms

Tor Exit Addresses on SecurityListing: A database of Tor exit nodes with their corresponding IP addresses and timestamps.

WayBackMachine

WayBackMachine

language

Digital Forensics and Incident Response

WayBackMachine on SecurityListing: A digital archive of the internet, allowing users to capture and browse archived web pages.

Snap7 Homepage

Snap7 Homepage

language

Industrial Control System Security

Snap7 Homepage on SecurityListing: Website providing information on Snap7 open-source communication library.

ResourcesExtract

ResourcesExtract

language

Digital Forensics and Incident Response

ResourcesExtract on SecurityListing: Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files

Sniff

Sniff

language

Network Detection and Response

Sniff on SecurityListing: Makes output from the tcpdump program easier to read and parse.

Steghide

Steghide

language

Digital Forensics and Incident Response

Steghide on SecurityListing: Steghide is a steganography program for hiding data in image and audio files.

tcpdump

tcpdump

language

Network Detection and Response

tcpdump on SecurityListing: Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.

Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation

Trust Direction: An

language

Offensive Security

Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

Showing 3261 to 3280 of 4175 products