search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

cabextract

cabextract

language

Digital Forensics and Incident Response

cabextract on SecurityListing: Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.

4.5(1)
Permiso Identity Security

Permiso Identity Security

language

Identity Threat Detection and Response

Permiso Identity Security on SecurityListing: Identity security platform for AI users, builders, and agents across cloud envs

4.5(1)
Cyver Pentest Management Platform

Cyver Pentest Management

language

Penetration Testing

Cyver Pentest Management Platform on SecurityListing: Pentest management platform for reporting, project mgmt & client collaboration

4.5(1)
JupiterOne Continuous Evidence Engine

JupiterOne Continuous Evidence

language

Compliance Management

JupiterOne Continuous Evidence Engine on SecurityListing: Continuous controls monitoring platform with automated evidence generation

4.5(1)
Blackwall GateKeeper

Blackwall GateKeeper

language

Distributed Denial of Service Mitigation

Blackwall GateKeeper on SecurityListing: Web security & traffic filtering platform for hosting providers

4.5(1)
Jericho Employee Performance Analytics

Jericho Employee Performance

language

Security Awareness Training

Jericho Employee Performance Analytics on SecurityListing: Employee performance analytics platform for phishing simulation & training

4.5(1)
Prophaze WAF-as-a-Service

Prophaze WAF-as-a-Service

language

API Security

Prophaze WAF-as-a-Service on SecurityListing: Cloud-based WAF service protecting web apps from threats and vulnerabilities

4.5(1)
Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives

Basic Linux Privilege

language

Guides

Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives on SecurityListing: A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

4.5(1)
Bitwarden

Bitwarden

language

Password Management

Bitwarden on SecurityListing: Secure and manage passwords across devices with Bitwarden's open-source, encrypted password manager.

4.5(1)
Miggo Security

Miggo Security

language

Dynamic Application Security Testing

Miggo Security on SecurityListing: Application monitoring and security platform that provides runtime visibility, threat detection, and automated response capabilities for application-layer security

4.5(1)
Attic MDR

Attic MDR

language

Threat Hunting

Attic MDR on SecurityListing: 24/7 managed detection and response service for Microsoft 365 environments

4.5(1)
DeepSource SCA

DeepSource SCA

language

Software Composition Analysis

DeepSource SCA on SecurityListing: SCA platform with reachability analysis, AI-powered fixes, and license compliance

4.5(1)
BitLyft True MDR

BitLyft True MDR

language

Threat Hunting

BitLyft True MDR on SecurityListing: 24/7 managed detection and response service with US-based SOC analysts

4.5(1)
Alien Vault Ossim

Alien Vault Ossim

language

Vulnerability Assessment

Alien Vault Ossim on SecurityListing: AlienVault OSSIM provides an all-in-one security management solution with asset discovery, vulnerability assessment, and SIEM capabilities.

4.5(1)
NinjaOne RMM

NinjaOne RMM

language

Endpoint Protection Platform

NinjaOne RMM on SecurityListing: RMM platform for automating IT management and technician operations

4.5(1)
CMMC Resources

CMMC Resources

language

Compliance Management

CMMC Resources on SecurityListing: A compliance management platform that simplifies CMMC Level 1 certification for defense contractors through guided workflows, policy templates, and evidence management tools.

4.5(1)
DiskShadow

DiskShadow

language

Offensive Security

DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

4.5(1)
TechTarget

TechTarget

language

Offensive Security

TechTarget on SecurityListing: Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.

4.5(1)
Quorum Cyber Clarity

Quorum Cyber Clarity

language

Data Loss Prevention

Quorum Cyber Clarity on SecurityListing: Managed security services platform offering MDR, threat detection, and DLP

4.5(1)
Opscompass Cloud & Database Asset Intelligence

Opscompass Cloud &

language

Database Security

Opscompass Cloud & Database Asset Intelligence on SecurityListing: Cloud & database asset intelligence platform for visibility & compliance

4.5(1)
Showing 541 to 560 of 4175 products