Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

SecGame #1: Sauron
Penetration Testing
SecGame #1: Sauron on SecurityListing: A Linux-based environment for penetration testing and vulnerability exploitation

Securing NFS Red
Guides
Securing NFS Red Hat Enterprise Linux 7 on SecurityListing: Guidance on securing NFS in Red Hat Enterprise Linux 7

Supply Wisdom Continuous
Risk Assessment
Supply Wisdom Continuous Monitoring on SecurityListing: Continuous monitoring platform for third-party supplier and location risks

ThisisLegal.com
Cyber Range Training
ThisisLegal.com on SecurityListing: Hacker wargames site with forums and tutorials, fostering a learning community.

Troy Hunt
Offensive Security
Troy Hunt on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

Windows 7 UAC
API Security
Windows 7 UAC Whitelist Code-Injection Issue on SecurityListing: Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

Security Tips -
Guides
Security Tips - Apache HTTP Server Version 2.4 on SecurityListing: Security tips for setting up an Apache HTTP Server to prevent security issues.

tcpxtract
Digital Forensics and Incident Response
tcpxtract on SecurityListing: A tool for extracting files from network traffic based on file signatures with support for various file formats and scalable search algorithm.

SAFE Intake Form
Third-Party Risk Management
SAFE Intake Form AI Agent on SecurityListing: AI agent that automates vendor intake form parsing for TPRM onboarding

PowerUpSQL
Penetration Testing
PowerUpSQL on SecurityListing: Tool for attacking Active Directory environments through SQL Server access.

Serving Random Payloads
Penetration Testing
Serving Random Payloads with Apache mod_rewrite on SecurityListing: A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

ThreatQuotient ThreatQ Platform
Threat Hunting
ThreatQuotient ThreatQ Platform on SecurityListing: Threat intelligence platform for detection, investigation, and response

Tor Exit Addresses
Threat Intelligence Platforms
Tor Exit Addresses on SecurityListing: A database of Tor exit nodes with their corresponding IP addresses and timestamps.

WayBackMachine
Digital Forensics and Incident Response
WayBackMachine on SecurityListing: A digital archive of the internet, allowing users to capture and browse archived web pages.

Snap7 Homepage
Industrial Control System Security
Snap7 Homepage on SecurityListing: Website providing information on Snap7 open-source communication library.

ResourcesExtract
Digital Forensics and Incident Response
ResourcesExtract on SecurityListing: Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files

Sniff
Network Detection and Response
Sniff on SecurityListing: Makes output from the tcpdump program easier to read and parse.

Steghide
Digital Forensics and Incident Response
Steghide on SecurityListing: Steghide is a steganography program for hiding data in image and audio files.

tcpdump
Network Detection and Response
tcpdump on SecurityListing: Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.

Trust Direction: An
Offensive Security
Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation