Behavioral Analysis

Explore 239 curated cybersecurity tools, with 15,161 visitors searching for solutions

Mimecast Engage Logo

Mimecast Engage is a human risk management platform that combines AI-powered email security with security awareness training to protect against threats and reduce risks from user behavior.

0
Hoxhunt Human Risk Management Platform Logo

AI-powered platform for security awareness training and phishing simulations

0
Red Hand Analyzer Logo

Red Hand Analyzer is an online tool that provides automated behavioral analysis of PCAP files to detect malicious network activities and security vulnerabilities without decrypting traffic content.

1
Verax Verax Protect Logo

Platform for monitoring and securing LLMs in production environments

0
Trellix Intrusion Prevention System Logo

A next-generation intrusion prevention system that combines signature-based and behavioral detection techniques to identify and block sophisticated network threats across hybrid environments.

0
Varonis AI-Native Email Security Logo

DSPM solution for data discovery, classification, remediation, and threat detection

0
Security Mentor Security Awareness Training Logo

Security awareness training platform with phishing simulation and policy tracking

0
Living Security Human Risk Management Logo

AI-driven Human Risk Management platform for security awareness and training

0
Prophaze Advanced AI-Based App & API Security Logo

AI-based app & API security platform with WAF, DDoS protection, and bot mitigation

0
Cequence AI Gateway Logo

Unified platform for API security, bot management, and AI gateway protection

0
HitmanPro.Alert Logo

A lightweight malware detection and removal tool that provides real-time protection against complex attacks while preserving system resources.

0
Cuckoo Mod Logo

A modified version of Cuckoo Sandbox with enhanced features and capabilities.

0
UDcide Logo

UDcide is an Android malware analysis tool that detects and removes specific malicious behaviors from malware samples while preserving the binary for investigation purposes.

0
Sophos Endpoint Logo

AI-powered endpoint security with prevention-first approach and EDR capabilities

0
CuckooDroid Logo

CuckooDroid extends Cuckoo Sandbox to provide automated dynamic analysis of Android applications in a controlled sandbox environment.

0
The Threat Hunter Playbook Logo

A community-driven open source project providing interactive notebooks with detection logic, adversary tradecraft, and resources organized according to MITRE ATT&CK framework for threat hunting and detection development.

0
CAPE Logo

Malware sandbox for executing malicious files in an isolated environment with advanced features.

0
Crowdroid: Behavior-Based Malware Detection System for Android Logo

A behavior-based malware detection system for Android platforms that uses crowdsourcing to detect anomalies and malware in applications.

0
Malheur Logo

Automatic analysis of malware behavior using machine learning.

0
OpenText Core Endpoint Protection Logo

Cloud-based endpoint protection using machine learning and threat intel

0
DroidBox Logo

DroidBox is a dynamic analysis framework for Android applications that monitors runtime behavior, network activity, file operations, and security events while generating behavioral visualizations.

0
Valkyrie Comodo Logo

Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.

0
capa Logo

Capa is a malware analysis tool that detects capabilities in executable files by analyzing PE, ELF, .NET modules, shellcode, and sandbox reports to identify potential malicious behaviors with ATT&CK framework mapping.

0