Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

SecurityScope

SecurityScope

EG flag

Application Security

SecurityScope offers hands-on cybersecurity training and penetration testing labs, providing immersive environments to practice real-world scenarios. The organization focuses on ethical hacking, vulne

4.5(1)
ENAC

ENAC

Spain flag

Security Operations

ENAC is the national accreditation body for Spain, responsible for assessing the competence and capability of organisations that provide certification, testing, inspection and calibration services. E

4.5(1)
GHH - Google Hack Honeypot

GHH - Google

language

Security Operations

GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

4.5(1)
The Matasano Crypto Challenges

The Matasano Crypto

language

Secure Code Training

The Matasano Crypto Challenges on SecurityListing: A set of 48 practical programming exercises in cryptography and application security

4.5(1)
ERM Protect PCI Compliance

ERM Protect PCI

language

Compliance Management

ERM Protect PCI Compliance on SecurityListing: PCI DSS compliance services and consulting for payment card security

4.5(1)
URLhaus

URLhaus

language

Threat Intelligence Platforms

URLhaus on SecurityListing: A project sharing malicious URLs used for malware distribution to help protect networks.

4.5(1)
Eclypsium Supply Chain Security

Eclypsium Supply Chain

language

Cyber Asset Attack Surface Management

Eclypsium Supply Chain Security on SecurityListing: Supply chain security platform for IT infrastructure hardware and firmware

4.5(1)
ACA Group

ACA Group

United States flag

Governance Risk and Compliance Platforms

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services. ACA Compliance Group was founded in 2002 by four former SEC regulators and one former state regulator. Th

4.5(1)
Assac Networks

Assac Networks

Israel flag

Security Operations

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking. ShieldiT is a complete anti-hacking anti-tapping solution which encapsulates various tact

4.5(1)
Positive Hack Days Fest

Positive Hack Days

language

Cyber Range Training

Positive Hack Days Fest on SecurityListing: International cybersecurity festival for all, who wants to dive into the world of cyber security and have a great time.

4.5(1)
EclecticIQ Intelligence Center

EclecticIQ Intelligence Center

language

Threat Hunting

EclecticIQ Intelligence Center on SecurityListing: Threat intelligence platform for collecting, analyzing, and sharing CTI data

4.5(1)
Ascent Cyber

Ascent Cyber

United Kingdom flag

Compliance Consulting

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime. Ascent Cyber are bringing a Government approved level of cyb

4.5(1)
East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber

United Kingdom flag

Governance Risk and Compliance Platforms

The East Midlands Cyber Resilience Centre (EMCRC) is set up to support and help protect businesses across the region against cyber crime. By working in conjunction with local universities and the fiv

4.5(1)
Reversing and Exploiting ARM Binaries: rwthCTF Trafman

Reversing and Exploiting

language

Offensive Security

Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

4.5(1)
E Lectures AI

E Lectures AI

United Arab Emirates flag

AI Security

E Lectures AI is an online education platform offering digital lectures focused on computing, artificial intelligence, and future technologies. The site features programming courses and core computer

4.5(1)
689cloud

689cloud

VN flag

Data Loss Prevention

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared. This means that important content such as confidential documents

4.5(1)
Factmata

Factmata

United Kingdom flag

Brand Protection

Factmata is an advanced social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting the ones most likely to cause brand harm or misinform

4.5(1)
Harness AI for DevOps

Harness AI for

language

Security Orchestration Automation and Response

Harness AI for DevOps on SecurityListing: AI-powered DevOps platform for CI/CD, testing, security, and cost mgmt.

4.5(1)
E-VasTel

E-VasTel

EG flag

Data Protection

E-VasTel is a software services provider delivering IT solutions and services for both large enterprises and small to medium-sized organizations. The company emphasizes cybersecurity, application and

4.5(1)
Advanced Systems International SAC

Advanced Systems International

Peru flag

Data Loss Prevention

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing. USB Device Control is an important part of Endpoint Security Manage

4.5(1)
Showing 741 to 760 of 4175 products