Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
SaltyCloud Isora GRC
Risk Assessment
SaltyCloud Isora GRC on SecurityListing: GRC platform for infosec assessment, risk mgmt, vendor & asset oversight
XBOW Captcha Bypass
Penetration Testing
XBOW Captcha Bypass Tool on SecurityListing: AI-powered automated penetration testing platform for vulnerability discovery
Mandos Cyber Strategy
Guides
Mandos Cyber Strategy OS on SecurityListing: Curated cybersecurity frameworks, templates & guides for security programs
OWASP Bricks
Penetration Testing
OWASP Bricks on SecurityListing: Deliberately vulnerable web application for security professionals to practice attack techniques.
PF_RING ZC (Zero
Network Detection and Response
PF_RING ZC (Zero Copy) on SecurityListing: High-performance packet capture library with zero copy functionality.
Security Trainings
Guides
Security Trainings on SecurityListing: Free training sessions on Reverse Engineering, Malware Analysis, and Exploit Development.
Using a SCF
Offensive Security
Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.
Security Intelligence
Offensive Security
Security Intelligence on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Internacious Website and
Security Scanning
Internacious Website and Email Security Scan on SecurityListing: Web and email security scanner that checks 16 critical security points in 60 seconds
UPX
Offensive Security
UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.
SAFE Cyber Risk
Risk Assessment
SAFE Cyber Risk Quantification on SecurityListing: Cyber risk quantification platform using FAIR methodology for financial analysis
ClickOnce (Twice or
Penetration Testing
ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution on SecurityListing: A technique for social engineering and untrusted command execution using ClickOnce technology
DDE attack with
Offensive Security
DDE attack with PowerShell Empire on SecurityListing: Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
Oneleet Cybersecurity &
Compliance Management
Oneleet Cybersecurity & Compliance Platform on SecurityListing: Automated compliance and security platform for SOC 2, ISO 27001, and HIPAA
Password Storage -
Cheat Sheets
Password Storage - OWASP Cheat Sheet Series on SecurityListing: Guidelines and best practices for securely storing passwords.
Sigma Query
Threat Hunting
Sigma Query on SecurityListing: Searchable repository of Sigma detection rules for threat hunting and SIEM
Slavehack 2
Cyber Range Training
Slavehack 2 on SecurityListing: Online hacking game with realistic hacking experience and player interaction.
ASecureCloud
Cloud Security Posture Management
ASecureCloud on SecurityListing: AI-Powered Cloud Assistant for building, securing, and operating cloud environments.
Mandos Brief
Threat Intelligence Platforms
Mandos Brief on SecurityListing: Weekly cybersecurity newsletter covering security incidents, AI, and leadership
Mandos Fractional CISO
Risk Assessment
Mandos Fractional CISO on SecurityListing: Fractional CISO services for B2B companies to build security programs