Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
Silent Push Community
API Security
Silent Push Community Edition on SecurityListing: Free threat intel platform for DNS data analysis and infrastructure mapping
Supply Wisdom Comprehensive
Risk Assessment
Supply Wisdom Comprehensive Intelligence on SecurityListing: Third-party risk intelligence platform with real-time alerts and reports
Blackmere Consulting

Security Operations
Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology. From Fortune 100 companies to emerging growth organizations, our fo
WebDAV Covert Channel
Offensive Security
WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
Meta 1st

Security Awareness Training
Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer. Analyse 1stAn AI-drive
Kennedys

Security Operations
Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk. Our global
Web Application Exploits
Guides
Web Application Exploits and Defenses on SecurityListing: An educational codelab that demonstrates web application vulnerabilities including XSS, XSRF, and code execution attacks along with their corresponding defensive measures.
Stellar Cyber Multi-Layered
Extended Detection and Response
Stellar Cyber Multi-Layered AI Platform on SecurityListing: AI-driven Open XDR platform for MSSPs with multi-tenancy and automation
Bsquare

Industrial Control System Security
Bsquare DataV software solutions can be deployed by a wide variety of enterprises to create business-focused Internet of Things (IoT) systems that more effectively monitor device data, automate proces
Igloo Security

Managed Security Service Providers
Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services); providing intuitive secur
Active Countermeasures

Security Awareness Training
Active Countermeasures is a group of like-minded geeks that believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable
Stamus Clear NDR
Threat Hunting
Stamus Clear NDR Community on SecurityListing: Open source Suricata-based NDR system with threat detection and analysis
NordLayer NordStellar
Multi-Factor Authentication and Single Sign-On
NordLayer NordStellar on SecurityListing: Threat intelligence platform combining network security and threat exposure mgmt
ONYPHE
External Attack Surface Management
ONYPHE on SecurityListing: ONYPHE is a cyber defense search engine that discovers exposed assets and provides real-time monitoring to identify vulnerabilities and potential risks.
Acronis DeviceLock DLP
Data Loss Prevention
Acronis DeviceLock DLP on SecurityListing: Endpoint DLP solution for discovering, protecting, and monitoring sensitive data
Sabotage: Code added
Software Composition Analysis
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus on SecurityListing: A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.
SAFE Questionnaire Analyzer
Risk Assessment
SAFE Questionnaire Analyzer AI Agent on SecurityListing: AI agent that auto-populates third-party security questionnaires
MokN Lantern
External Attack Surface Management
MokN Lantern on SecurityListing: EASM platform for continuous external attack surface monitoring and detection
Saviynt Secure Your
Third-Party Risk Management
Saviynt Secure Your External Workforce on SecurityListing: External identity mgmt platform for contractors, vendors, and third-party access
Understanding Docker container
Container Security
Understanding Docker container escapes on SecurityListing: Exploit that launches a process on the host from within a Docker container run with the --privileged flag by abusing the Linux cgroup v1 “notification on release” feature.