Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Cybersecurity
Browse 56 security tools
R&D firm providing cyber defense & operational tech for DoD and DHS.
R&D firm providing cyber defense & operational tech for DoD and DHS.
Managed threat detection and incident response service for outsourced SecOps.
Managed threat detection and incident response service for outsourced SecOps.
Govt-focused cyber intelligence & surveillance software provider.
Accredited forensic cell site geolocation analysis for criminal investigations.
Accredited forensic cell site geolocation analysis for criminal investigations.
Cyber range platform for Blue, Red & Purple team training & assessment.
Cyber range platform for Blue, Red & Purple team training & assessment.
Cyber training platform for CTF events, war games, and workforce dev.
Cyber training platform for CTF events, war games, and workforce dev.
Cybersecurity training platform with 350+ hands-on labs and instructor-led courses.
Cybersecurity training platform with 350+ hands-on labs and instructor-led courses.
On-demand cloud-hosted cybersecurity virtual lab training platform.
On-demand cloud-hosted cybersecurity virtual lab training platform.
Modular cybersecurity platform by CyberCyte with composable security components.
Modular cybersecurity platform by CyberCyte with composable security components.
Cybersecurity platform by CISOteria; full details not publicly available.
Cybersecurity platform by CISOteria; full details not publicly available.
AI-driven security platform covering multiple cybersecurity domains.
AI-driven security platform covering multiple cybersecurity domains.
Managed Detection & Response service for outsourced threat monitoring.
Managed Detection & Response service for outsourced threat monitoring.
Centralized cybersecurity visibility dashboard for Abacus Group clients.
Centralized cybersecurity visibility dashboard for Abacus Group clients.
Cyber range platform for finance & banking sector security training
Cyber range platform for finance & banking sector security training
ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.
ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.
A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.
A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
The Web's Largest Community Tracking Online Fraud & Abuse
A repository of YARA rules for identifying and classifying malware through pattern-based detection.
A repository of YARA rules for identifying and classifying malware through pattern-based detection.
A lightweight CTF platform with simple setup and difficulty-based scoring that removes timezone advantages from competitions.
A lightweight CTF platform with simple setup and difficulty-based scoring that removes timezone advantages from competitions.
A free and open-source OSINT framework for gathering and analyzing data from various sources
A free and open-source OSINT framework for gathering and analyzing data from various sources
echoCTF is a cybersecurity framework for running Capture the Flag competitions and training exercises on real IT infrastructure.
echoCTF is a cybersecurity framework for running Capture the Flag competitions and training exercises on real IT infrastructure.
A network of physical and online cyber warfare ranges for training and testing
A network of physical and online cyber warfare ranges for training and testing
A wargame composed of 27 levels, with files needed in /vortex/ directory.
A wargame composed of 27 levels, with files needed in /vortex/ directory.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Agentless cloud security platform for risk detection & prevention
Fractional CISO services for B2B companies to build security programs