Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
CSIS Emergency Response
Threat Intelligence Platforms
CSIS Emergency Response Retainers on SecurityListing: 24/7 incident response retainer service with guaranteed availability
vi Editor Cheat
Cheat Sheets
vi Editor Cheat Sheet on SecurityListing: A quick reference guide for the VI editor, covering commands and modes.
WeChall
Cyber Range Training
WeChall on SecurityListing: A free online wargame for practicing hacking skills and learning security concepts.
Wifislax
Penetration Testing
Wifislax on SecurityListing: GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
Windows Commands Abused
Guides
Windows Commands Abused by Attackers on SecurityListing: Malware allows attackers to execute Windows commands from a remote environment
Sonarsource SonarQube IDE
Static Application Security Testing
Sonarsource SonarQube IDE on SecurityListing: IDE plugin for real-time code quality and security issue detection
Framework for Cybersecurity
Threat Intelligence Platforms
Framework for Cybersecurity Info Sharing on SecurityListing: A Microsoft framework for secure and efficient sharing of cybersecurity information between trusted parties to reduce cybersecurity risks.
X-Ways Forensics
Digital Forensics and Incident Response
X-Ways Forensics on SecurityListing: Advanced computer forensics software with efficient features.
XSS'OR
Offensive Security
XSS'OR on SecurityListing: Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.
OX Application Security
Container Security
OX Application Security on SecurityListing: ASPM platform with Code Projection tech for SDLC risk prioritization
XBOW Lightspeed
API Security
XBOW Lightspeed on SecurityListing: Autonomous web app pentesting platform with exploit validation
SAP Cloud Identity
Identity Governance and Administration
SAP Cloud Identity Access Governance on SecurityListing: A cloud-based identity and access management solution that provides access governance, compliance monitoring, and risk management for hybrid environments.
SAFE Digital Footprint
Third-Party Risk Management
SAFE Digital Footprint AI Agent on SecurityListing: AI agent for real-time third-party digital footprint mapping and monitoring
Ranges – Cyber
Cyber Range Training
Ranges – Cyber Warfare Range LLC on SecurityListing: A network of physical and online cyber warfare ranges for training and testing
Stellar Cyber Human-Augmented
Extended Detection and Response
Stellar Cyber Human-Augmented Autonomous SOC on SecurityListing: AI-native SecOps platform combining SIEM, XDR, NDR, ITDR, and UEBA capabilities
Security Mentor Security
Security Awareness Training
Security Mentor Security Awareness Materials on SecurityListing: Pre-built security awareness materials including posters and cartoons
QuoIntelligence Threat Intelligence
Brand Protection
QuoIntelligence Threat Intelligence Services on SecurityListing: European threat intelligence as-a-service provider with analyst support
SpyCloud Investigations Module
Threat Intelligence Platforms
SpyCloud Investigations Module on SecurityListing: AI-powered investigation tool for analyzing identity exposures from darknet data
Kaduu Domain Monitoring
Brand Protection
Kaduu Domain Monitoring Solution on SecurityListing: Domain monitoring solution detecting typosquatting and domain spoofing attacks
Security Week
Blogs and News
Security Week on SecurityListing: A general cybersecurity news site providing discussions and news on various cybersecurity topics.