Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
Risk Cognizance Ticket
Governance Risk and Compliance Platforms
Risk Cognizance Ticket Management on SecurityListing: Ticket management system for tracking and resolving security issues.
TrojAI
AI Model Security
TrojAI on SecurityListing: TrojAI is an AI security platform that detects vulnerabilities in AI models and defends against attacks on AI applications.
Onapsis SAP Cybersecurity
Risk Assessment
Onapsis SAP Cybersecurity Solution on SecurityListing: SAP-focused cybersecurity platform for vulnerability mgmt and threat detection
PowerUpSQL
Penetration Testing
PowerUpSQL on SecurityListing: Tool for attacking Active Directory environments through SQL Server access.
ResourcesExtract
Digital Forensics and Incident Response
ResourcesExtract on SecurityListing: Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files
Snap7 Homepage
Industrial Control System Security
Snap7 Homepage on SecurityListing: Website providing information on Snap7 open-source communication library.
Sniff
Network Detection and Response
Sniff on SecurityListing: Makes output from the tcpdump program easier to read and parse.
tcpick
Digital Forensics and Incident Response
tcpick on SecurityListing: A textmode sniffer for tracking tcp streams and capturing data in various modes.
isMalicious Threat Intelligence
Threat Intelligence Platforms
isMalicious Threat Intelligence on SecurityListing: Threat intelligence database with 500M+ malicious IPs, domains, and IOCs via API
Steghide
Digital Forensics and Incident Response
Steghide on SecurityListing: Steghide is a steganography program for hiding data in image and audio files.
tcpdump
Network Detection and Response
tcpdump on SecurityListing: Tcpdump is a command-line packet analyzer for capturing and analyzing network traffic.
Trust Direction: An
Offensive Security
Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation
Twitter's Vine Source
Penetration Testing
Twitter's Vine Source Code Dump on SecurityListing: A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.
Altospam Mailsafe
Email Security Platforms
Altospam Mailsafe on SecurityListing: Cloud-based anti-spam solution filtering inbound email threats
Verificient Proctordiy
Security Awareness Training
Verificient Proctordiy on SecurityListing: DIY live proctoring platform for remote exam monitoring with AI assistance
The Absurdly Underestimated
Blogs and News
The Absurdly Underestimated Dangers of CSV Injection on SecurityListing: A blog post discussing the often overlooked dangers of CSV injection in applications.
Tracking a stolen
Digital Forensics and Incident Response
Tracking a stolen code-signing certificate with osquery on SecurityListing: Detect signed malware and track stolen code-signing certificates using osquery.
URL Redirect from
Next-Generation Firewalls
URL Redirect from www to non-www on SecurityListing: Automatically redirect users from www to non-www for a secure connection.
DarknetSearch Dark Web
Brand Protection
DarknetSearch Dark Web Monitoring on SecurityListing: Dark web monitoring platform for detecting exposed credentials and threats
MFT Parsers Review
Digital Forensics and Incident Response
MFT Parsers Review on SecurityListing: Review of various MFT parsers used in digital forensics for analyzing NTFS file systems.