Security tools and resources tailored for specific industries or unique security challenges.Explore 84 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
A cyber risk management platform that financially quantifies cyber risks and provides actionable mitigation strategies while integrating with insurance coverage.
A cyber risk management platform that financially quantifies cyber risks and provides actionable mitigation strategies while integrating with insurance coverage.
A platform that provides visibility and security monitoring of hardware, firmware, and software components in IT infrastructure to identify supply chain risks and vulnerabilities.
A platform that provides visibility and security monitoring of hardware, firmware, and software components in IT infrastructure to identify supply chain risks and vulnerabilities.
The Upstream Security Platform is a cloud-based solution for monitoring and securing connected vehicles and mobility IoT devices, offering features such as cybersecurity detection, API protection, and fraud detection.
The Upstream Security Platform is a cloud-based solution for monitoring and securing connected vehicles and mobility IoT devices, offering features such as cybersecurity detection, API protection, and fraud detection.
Tessian is an AI-powered cloud email security solution that protects against advanced phishing, account compromise, data exfiltration, and helps coach users on email security.
Tessian is an AI-powered cloud email security solution that protects against advanced phishing, account compromise, data exfiltration, and helps coach users on email security.
A next-generation file integrity monitoring and change detection system
A next-generation file integrity monitoring and change detection system
A PowerShell script that assesses security configurations of Siemens SIMATIC PCS 7 industrial control systems by collecting and analyzing data from various Windows and PCS7-specific sources.
A PowerShell script that assesses security configurations of Siemens SIMATIC PCS 7 industrial control systems by collecting and analyzing data from various Windows and PCS7-specific sources.
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.
An open source framework for security assessments of iOS apps, now decommissioned in favor of Objection.
An open source framework for security assessments of iOS apps, now decommissioned in favor of Objection.
A tool for analyzing Android applications in local storage with various functionalities.
A tool for analyzing Android applications in local storage with various functionalities.
AMDH is an Android tool for automating scanning, hardening system settings, detecting malware, and protecting privacy.
AMDH is an Android tool for automating scanning, hardening system settings, detecting malware, and protecting privacy.
Android application for learning about vulnerabilities in modern Android apps and testing pentesting skills.
Android application for learning about vulnerabilities in modern Android apps and testing pentesting skills.
GridPot is a cybersecurity tool that integrates GridLAB-D, Conpot, and libiec61850 to simulate and detect attacks on industrial control systems (ICS).
GridPot is a cybersecurity tool that integrates GridLAB-D, Conpot, and libiec61850 to simulate and detect attacks on industrial control systems (ICS).
Aggregates known Android security vulnerabilities with detailed examples and analysis.
Aggregates known Android security vulnerabilities with detailed examples and analysis.
Verify scripts and executables to mitigate chain of supply attacks.
Verify scripts and executables to mitigate chain of supply attacks.
Steghide is a steganography program for hiding data in image and audio files.
Steghide is a steganography program for hiding data in image and audio files.
Python package for processing and analyzing Zeek data with Pandas, scikit-learn, Kafka, and Spark, with offloading capabilities and improved data analysis features.
Python package for processing and analyzing Zeek data with Pandas, scikit-learn, Kafka, and Spark, with offloading capabilities and improved data analysis features.
A tool for extracting static and dynamic features from Android APKs.
A tool for extracting static and dynamic features from Android APKs.
A comprehensive checklist for securing Android apps
A comprehensive checklist for securing Android apps
An open-source project for dynamic analysis of Android applications using the Android Substrate framework.
An open-source project for dynamic analysis of Android applications using the Android Substrate framework.
A data-mining and deep web asset search engine for breach analysis and prevention services.
A data-mining and deep web asset search engine for breach analysis and prevention services.
A tool for quantitative risk analysis of Android applications using machine learning techniques.
A tool for quantitative risk analysis of Android applications using machine learning techniques.
AVEVA is an industrial software provider offering engineering, operations, and data management solutions for operational technology environments across various industrial sectors.
AVEVA is an industrial software provider offering engineering, operations, and data management solutions for operational technology environments across various industrial sectors.
A Low-cost ICS Security Testbed for Education and Research
Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.
Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.