Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

ThreatConnect Threat Intelligence
Risk Assessment
ThreatConnect Threat Intelligence Platform on SecurityListing: AI-powered threat intel platform for operationalizing CTI and cyber risk mgmt

ThingsRecon Attack Surface
API Security
ThingsRecon Attack Surface Discovery on SecurityListing: EASM platform for continuous external asset discovery and risk prioritization

CodeThreat AI-Native AppSec
Static Application Security Testing
CodeThreat AI-Native AppSec Platform on SecurityListing: AI-native AppSec platform for code security analysis and vulnerability detection

Vshadow
Offensive Security
Vshadow on SecurityListing: A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.

Vulners
Threat Intelligence Platforms
Vulners on SecurityListing: All-in-one vulnerability intelligence platform for prioritizing remediation efforts and driving security strategies.

DryRun Security AppSec
Static Application Security Testing
DryRun Security AppSec Agents on SecurityListing: AI-native SAST tool providing contextual code security analysis in pull requests

VX-Underground
Threat Intelligence Platforms
VX-Underground on SecurityListing: VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

Heeler Application Security
Dynamic Application Security Testing
Heeler Application Security Lifecycle Management on SecurityListing: ASPM platform for tracking app security risks from development to deployment

Theos Penetration Testing
API Security
Theos Penetration Testing on SecurityListing: Professional penetration testing services across multiple attack surfaces

Safetica Contextual Defense
Data Classification
Safetica Contextual Defense on SecurityListing: AI-powered DLP with contextual data classification and adaptive security

Radiant Logic RadiantOne
Risk Assessment
Radiant Logic RadiantOne on SecurityListing: Identity data platform that unifies, observes, and acts on identity data

Risk Cognizance GRC
Governance Risk and Compliance Platforms
Risk Cognizance GRC Tool for Mapping Compliance Levels on SecurityListing: GRC platform for mapping compliance levels across regulatory frameworks

Uptycs Cloud Workload
Container Security
Uptycs Cloud Workload Protection Platform on SecurityListing: Cloud workload protection platform for hybrid cloud environments

tcpkill
Penetration Testing
tcpkill on SecurityListing: A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.

Phoenix Security ASPM
Threat Intelligence Platforms
Phoenix Security ASPM on SecurityListing: ASPM platform with CNAPP integration for vulnerability prioritization & context

CertX

Security Operations
CertX is a Swiss functional safety, cybersecurity and artificial intelligence certification body. We provide product, process and company certifications, personal trainings and certification. Experts

BreakPoint Labs

Digital Forensics and Incident Response
BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations. Powered by highly-motivated, experienced cybersecurity professional

Cenobe Cyber Security

Governance Risk and Compliance Platforms
Cenobe provides customized solutions to keep you ahead of potential threats. Our suite of services, including penetration testing, vulnerability assessment, compliance audit, and red teaming, ensures

SQL Injection Cheat
Database Security
SQL Injection Cheat Sheet on SecurityListing: A comprehensive SQL injection cheat sheet covering various database management systems and techniques.

certSIGN

Data Loss Prevention
certSIGN develop innovative software for information security and information systems protection. We help protect electronic information, from contracts and online transactions to information stored