search
Join or Log In

Cybersecurity Tools Directory

Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.

PentesterLab PRO

PentesterLab PRO

language

Penetration Testing

PentesterLab PRO on SecurityListing: Online platform offering 700+ hands-on web security exercises and training

4.7(2)
British Assessment Bureau

British Assessment Bureau

United Kingdom flag

Security Operations

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001. Our UKAS accreditation is a key part of th

4.7(2)
ID North Managed Security Services

ID North Managed

language

Privileged Access Management

ID North Managed Security Services on SecurityListing: A managed security service provider specializing in identity security solutions including IAM, IGA, and PAM with implementation, operational, and advisory services.

4.7(2)
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

Cobalt Strike HTTP

language

Offensive Security

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

4.7(2)
EclecticIQ Threat Intelligence Platform

EclecticIQ Threat Intelligence

language

Threat Hunting

EclecticIQ Threat Intelligence Platform on SecurityListing: Threat intelligence platform for aggregating, analyzing, and sharing CTI data

4.7(2)
Lumifi ShieldVision™

Lumifi ShieldVision™

language

Endpoint Detection and Response

Lumifi ShieldVision™ on SecurityListing: SOAR platform with investigation, automation, and incident mgmt capabilities

4.7(2)
IDECSI MyDataManagement

IDECSI MyDataManagement

language

Data Security Posture Management

IDECSI MyDataManagement on SecurityListing: Data governance & security platform for Microsoft 365 & file servers

4.7(2)
DeepSource SAST

DeepSource SAST

language

Security Scanning

DeepSource SAST on SecurityListing: SAST engine that scans code commits for security vulnerabilities

4.7(2)
HitmanPro

HitmanPro

language

Endpoint Protection Platform

HitmanPro on SecurityListing: Malware detection and removal tool for infected computers

4.7(2)
DenyHosts

DenyHosts

language

Intrusion Detection and Prevention Systems

DenyHosts on SecurityListing: DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.

4.7(2)
Infosec4tc CISSP® Exam Preparation Training Course

Infosec4tc CISSP® Exam

language

Certifications

Infosec4tc CISSP® Exam Preparation Training Course on SecurityListing: CISSP exam prep training course covering 8 (ISC)2 knowledge domains

4.7(2)
N-Stalker

N-Stalker

language

Dynamic Application Security Testing

N-Stalker on SecurityListing: A web security tool that scans for vulnerabilities and known attacks.

4.7(2)
Kali

Kali

language

Vulnerability Assessment

Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

4.7(2)
LogCraft Detection Engineering

LogCraft Detection Engineering

language

Endpoint Detection and Response

LogCraft Detection Engineering on SecurityListing: Detection-as-code platform for managing detection rules across SIEM/EDR/XDR

4.7(2)
ISE Vulnerability Assessment Services

ISE Vulnerability Assessment

language

Penetration Testing

ISE Vulnerability Assessment Services on SecurityListing: Manual vulnerability assessment services with custom exploit development

4.7(2)
Exeon Analytics

Exeon Analytics

Switzerland flag

Threat Intelligence Platforms

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks. Our flagship product ExeonTrace uses machine learning and clusterin

4.7(2)
Certstream

Certstream

language

Brand Protection

Certstream on SecurityListing: Real-time monitoring tool for newly issued SSL certificates.

4.7(2)
ResponseHub Security Questionnaires

ResponseHub Security Questionnaires

language

Risk Assessment

ResponseHub Security Questionnaires on SecurityListing: AI-powered platform for automating security questionnaire responses

4.7(2)
Transpere

Transpere

United States flag

Security Operations

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services. We recognize the potential threat of stolen data and aim to protect our customers agai

4.7(2)
Zeta Sky

Zeta Sky

United States flag

Backup as a Service

Zeta Sky offers a full range of IT  and cyber-security services for your business. As an AWS consulting partner, our strength is in helping companies leverage Cloud based solutions to either augment t

4.7(2)
Showing 221 to 240 of 4175 products