Endpoint Security

Endpoint security tools for protecting desktops, laptops, mobile devices, and IoT endpoints from malware and cyber threats.

Explore 89 curated cybersecurity tools, with 14,252+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

WatchGuard EPDR Logo

Comprehensive endpoint protection solution providing advanced threat detection, proactive defense, and efficient management.

0
YARA-Endpoint Logo

YARA-Endpoint is a client-server architecture tool that can be used for endpoint protection and incident response.

0
Pareto Security Logo

A security checklist app for your Mac that helps you with basic security hygiene and prevents 80% of problems.

0
Do Not Disturb Logo

Do Not Disturb is a free open-source macOS security tool that detects unauthorized physical access to laptops.

0
ProcFilter Logo

ProcFilter is a process filtering system for Windows with built-in YARA integration, designed for malware analysts to create YARA signatures for Windows environments.

0
ThreatLocker Platform Logo

ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.

0
Firejail Logo

Firejail is a Linux sandbox program that isolates untrusted applications using kernel namespaces, seccomp-bpf, and capabilities to reduce security breach risks.

0
usbutils Logo

A collection of utilities for working with USB devices on Linux

0
Absolute Control Logo

Absolute Security provides a comprehensive cybersecurity platform that offers endpoint-to-network access coverage, automated security compliance, and secure endpoint and access solutions.

0
AMAaaS Agent Logo

Enhance your Android experience with the AMAaaS Agent APK for better performance and improved user experience.

0
AppLocker Guidance Logo

A repository containing scripts and configuration files to help administrators implement Microsoft AppLocker for application whitelisting based on NSA security guidelines.

0
DocBleach Logo

DocBleach is a Content Disarm and Reconstruction software that sanitizes Office documents by removing potentially malicious dynamic content to prevent security threats.

0
Fleet Logo

Fleet is an open-source endpoint management platform that provides device management, vulnerability reporting, and security monitoring capabilities for IT and security teams managing large computer environments.

0
Raccine Logo

A simple ransomware protection that intercepts and kills malicious processes attempting to delete shadow copies using vssadmin.exe.

0
Mobile Sandbox Logo

Cloud-based service for testing and analyzing Android and iOS apps for malware, vulnerabilities, and security threats.

0
WMI Monitor Logo

Monitor WMI consumers and processes for potential malicious activity

0
Rootkit Hunter Logo

A Unix-based tool that scans for rootkits and other malware on a system, providing a detailed report of the scan results.

0