Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
PrivSec

Data Protection
PrivSec is an IT Solutions company specialized in the security field, providing services in securing and protecting information and data privacy for companies and institutions.
FossID Software Composition
Software Composition Analysis
FossID Software Composition Analysis on SecurityListing: SCA tool for code scanning, license identification, and SBOM generation
Fraud.com fcase Fraud
API Security
Fraud.com fcase Fraud Orchestration on SecurityListing: Fraud orchestration platform for financial institutions
Gravwell Security Data
Threat Hunting
Gravwell Security Data Platform on SecurityListing: Security data platform for log analysis, metrics, and threat hunting
Graylog AI-Powered Security
API Security
Graylog AI-Powered Security & IT Operations on SecurityListing: AI-powered SIEM, API security, and log management platform
HiddenLayer AISec Platform
Data Loss Prevention
HiddenLayer AISec Platform on SecurityListing: Platform for securing AI models and autonomous agents across their lifecycle
HackNotice Services
Third-Party Risk Management
HackNotice Services on SecurityListing: Real-time threat intelligence platform monitoring dark web, breaches & supply chain
Haekka Phishing Simulator
Security Awareness Training
Haekka Phishing Simulator on SecurityListing: Slack-integrated phishing simulator with real-time training capabilities
Heeler ASPM
Dynamic Application Security Testing
Heeler ASPM on SecurityListing: ASPM platform that correlates security findings and reduces alert noise by 99%
Hive Pro Uni5
Exposure Management
Hive Pro Uni5 Xposure on SecurityListing: Threat exposure management platform implementing CTEM framework end-to-end
Imprivata Privileged Access
Password Management
Imprivata Privileged Access Management on SecurityListing: PAM solution for discovering, managing, auditing privileged accounts & sessions
How to Write
Offensive Security
How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset
Huntbase Platform
Threat Hunting
Huntbase Platform on SecurityListing: Platform for threat investigation with automation and knowledge management
Innvikta Phishing Simulator
Security Awareness Training
Innvikta Phishing Simulator on SecurityListing: Phishing simulation platform with automated attack simulations and training
Incident Response Flowchart
Guides
Incident Response Flowchart on SecurityListing: A structured approach to managing and responding to suspected security events or incidents.
Infosec4tc CISM Latest
Certifications
Infosec4tc CISM Latest Exam Questions on SecurityListing: CISM exam prep with 620 practice questions across 4 online simulators
Intelligence-Driven Computer Network
Threat Intelligence Platforms
Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains on SecurityListing: A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
Junglemap SaaS-platform
Security Awareness Training
Junglemap SaaS-platform on SecurityListing: SaaS platform for security awareness training with phishing simulation
Junglemap NanoLearning
Security Awareness Training
Junglemap NanoLearning on SecurityListing: Security awareness training platform using NanoLearning methodology
Kodem C.O.R.E.
Container Security
Kodem C.O.R.E. on SecurityListing: Unified engine correlating static & runtime analysis for app security