Cybersecurity Tools Directory
Compare cybersecurity software from an independent directory. Browse expert-reviewed security tools and independent cybersecurity product listings.
Faraday Faraday All-in-One
Penetration Testing
Faraday Faraday All-in-One on SecurityListing: Modular offensive security platform for continuous monitoring and testing
xxd
Digital Forensics and Incident Response
xxd on SecurityListing: A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
XRATOR CISO-as-a-Service Platform
Risk Assessment
XRATOR CISO-as-a-Service Platform on SecurityListing: CISO-as-a-Service platform for SMBs with CTEM and vulnerability management
RateYourCyber Cybersecurity Assessment
Risk Assessment
RateYourCyber Cybersecurity Assessment on SecurityListing: Cybersecurity assessment platform for SMEs with maturity scoring and roadmaps
Kaduu Dark Web
API Security
Kaduu Dark Web Monitoring on SecurityListing: Dark web monitoring platform for detecting data leaks and brand threats
xorlab Attachment Sandbox
Email Security Platforms
xorlab Attachment Sandbox on SecurityListing: Sandboxes email attachments to detect malicious behavior via dynamic analysis
XFA Device Security
Mobile Device Management
XFA Device Security on SecurityListing: Agentless device security platform for BYOD, managed, and external devices.
Nightfall AI Data
Data Classification
Nightfall AI Data Exfiltration Prevention on SecurityListing: AI-native DLP preventing data exfiltration across endpoints, SaaS, and AI apps
DTEX Insider Risk
Data Loss Prevention
DTEX Insider Risk Management on SecurityListing: AI-driven insider risk mgmt platform combining DLP, UEBA, and user monitoring
Censys Internet Intelligence
Threat Hunting
Censys Internet Intelligence Platform on SecurityListing: Internet intelligence platform for asset discovery and threat analysis
Raven Runtime SCA
Software Composition Analysis
Raven Runtime SCA on SecurityListing: Runtime SCA tool that identifies exploitable vulnerabilities in cloud environments
WPMissionControl
Application Security Posture Management
WPMissionControl on SecurityListing: WordPress monitoring platform for uptime, security, and performance tracking
Recorded Future
Threat Intelligence Platforms
Recorded Future on SecurityListing: A threat intelligence platform that provides comprehensive visibility into an organization's attack surface by collecting, analyzing, and structuring threat data to enable proactive security measures against emerging threats.
Identity Digital

Brand Protection
Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities. We’re
WordPress WPMissionControl
Application Security Posture Management
WordPress WPMissionControl on SecurityListing: WordPress plugin for site monitoring, security scanning, and observability
Workshop Hacking Bluetooth
Offensive Security
Workshop Hacking Bluetooth Smart locks on SecurityListing: A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.
Information Security Media

Security Operations
Information Security Media Group (ISMG) is the world’s largest media organization devoted solely to information security and risk management. Each of our media properties provides education, research
Proofpoint Identity Threat
Identity Threat Detection and Response
Proofpoint Identity Threat Defense on SecurityListing: Identity threat detection and response solution for account protection
Phoenix Security ASPM
Threat Intelligence Platforms
Phoenix Security ASPM on SecurityListing: ASPM platform with CNAPP integration for vulnerability prioritization & context
Apcon

Security Operations
Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments. Maximize Ne