Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
BoostSecurity Software Supply
Software Composition Analysis
BoostSecurity Software Supply Chain Protection on SecurityListing: Software supply chain security platform for SDLC infrastructure protection
Crypto Drainer Attack
Write-ups
Crypto Drainer Attack on SecurityListing: A deep dive into the Ledger connect-kit compromise decryption process.
Netlas
Threat Hunting
Netlas on SecurityListing: Threat intelligence and digital risk protection platform
Quad9
Intrusion Detection and Prevention Systems
Quad9 on SecurityListing: A free DNS recursive service that blocks malicious host names and protects user privacy.
BooleBox

Data Loss Prevention
Our data protection company’s mission is to design and develop innovative software dedicated to the total protection of sensitive and confidential corporate information wherever it is, always guarante
Burp Suite Professional
Vulnerability Assessment
Burp Suite Professional on SecurityListing: A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
360 Privacy 360
Digital Risk Protection
360 Privacy 360 Defend on SecurityListing: Digital protection service for executives with data removal and monitoring
Safe Solutions

Data Protection
Safe Solutions is a digital transformation company based in Egypt that specializes in information security, data protection, and process automation. They serve businesses across Egypt and the Gulf reg
DTEX Platform
Data Loss Prevention
DTEX Platform on SecurityListing: AI-driven platform for insider risk mgmt and DLP using behavioral analysis
Votiro Data Detection
Data Masking
Votiro Data Detection and Response on SecurityListing: Zero Trust platform for real-time data masking and file-borne threat prevention
CybSafe GUIDE
Security Awareness Training
CybSafe GUIDE on SecurityListing: Behavioral science-based security awareness training with personalized interventions
Exeon NDR
Network Detection and Response
Exeon NDR on SecurityListing: AI-powered NDR platform with UEBA for threat detection and network visibility
GreHack 2018 Conference
Guides
GreHack 2018 Conference Videos on SecurityListing: Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.
Digital Shadow Information

AI Security
Digital Shadow Information Technology provides data governance, data management, analytics, digital transformation, and cybersecurity solutions with a focus on data science and enterprise IT. The comp
Offensive Security Manager

Security Operations
Offensive Security Manager is the ultimate AI software that will enforce offensive security automation, orchestration, coverage, ensure quality, and lets you manage whole process. Our mission is to t
Borneo

Data Loss Prevention
Borneo is a Data Security Platform that helps organizations discover, classify, and remediate data and AI governance risks at scale while maintaining continuous compliance. Founded by security expert
Proofpoint Insider Threat
Data Loss Prevention
Proofpoint Insider Threat Management on SecurityListing: A security solution that monitors, detects, and responds to insider threats by providing visibility into user activities across endpoints, email, and cloud to prevent data loss from careless, compromised, or malicious insiders.
DNS Tunnelling
Offensive Security
DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.
Glide Identity Glide-In
API Security
Glide Identity Glide-In on SecurityListing: SIM-based identity verification for touchless check-in and authentication
cabextract
Digital Forensics and Incident Response
cabextract on SecurityListing: Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.