Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

Twitter's Vine Source
Penetration Testing
Twitter's Vine Source Code Dump on SecurityListing: A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

The Absurdly Underestimated
Blogs and News
The Absurdly Underestimated Dangers of CSV Injection on SecurityListing: A blog post discussing the often overlooked dangers of CSV injection in applications.

S2W SAIP
Risk Assessment
S2W SAIP on SecurityListing: Domain-specific ontology platform for knowledge-driven operational decisions

Teaching Security
Guides
Teaching Security on SecurityListing: Teaching Security provides educational resources and lessons for teaching cybersecurity concepts to high school students.
Tracking a stolen
Digital Forensics and Incident Response
Tracking a stolen code-signing certificate with osquery on SecurityListing: Detect signed malware and track stolen code-signing certificates using osquery.

URL Redirect from
Next-Generation Firewalls
URL Redirect from www to non-www on SecurityListing: Automatically redirect users from www to non-www for a secure connection.

vi Editor Cheat
Cheat Sheets
vi Editor Cheat Sheet on SecurityListing: A quick reference guide for the VI editor, covering commands and modes.

WeChall
Cyber Range Training
WeChall on SecurityListing: A free online wargame for practicing hacking skills and learning security concepts.

Wifislax
Penetration Testing
Wifislax on SecurityListing: GNU/Linux Wireless distribution for security testing with XFCE desktop environment.

Windows Commands Abused
Guides
Windows Commands Abused by Attackers on SecurityListing: Malware allows attackers to execute Windows commands from a remote environment

Risk Cognizance GRC
Risk Assessment
Risk Cognizance GRC Software with 6 Tools on SecurityListing: GRC platform with 6 tools for MSSPs/vCISOs to deliver GRC-as-a-Service

X-Ways Forensics
Digital Forensics and Incident Response
X-Ways Forensics on SecurityListing: Advanced computer forensics software with efficient features.

XSS'OR
Offensive Security
XSS'OR on SecurityListing: Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.

RSA ID Plus
Multi-Factor Authentication and Single Sign-On
RSA ID Plus on SecurityListing: IAM platform with MFA, SSO, and adaptive access for cloud, hybrid, on-prem

Ranges – Cyber
Cyber Range Training
Ranges – Cyber Warfare Range LLC on SecurityListing: A network of physical and online cyber warfare ranges for training and testing

RiskXchange Assured
Risk Assessment
RiskXchange Assured on SecurityListing: Managed third-party risk mgmt service with vendor assessments & compliance

SaltyCloud Stache
API Security
SaltyCloud Stache on SecurityListing: Cloud-based credential manager for secure storage and escrow of passwords & certs

tcpreplay
Offensive Security
tcpreplay on SecurityListing: Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

Risk Cognizance Supply
Risk Assessment
Risk Cognizance Supply Chain Cyber Risk Management Platform on SecurityListing: Supply chain cyber risk mgmt platform with AI vendor detection & monitoring

Wigle
External Attack Surface Management
Wigle on SecurityListing: WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.