Loading...
Explore 62 curated cybersecurity tools, with 15,190 visitors searching for solutions
Dark web monitoring service that detects leaked credentials and data breaches.
Dark web monitoring service that detects leaked credentials and data breaches.
Monitors dark web for compromised credentials and sensitive data exposure
Monitors dark web for compromised credentials and sensitive data exposure
Scans source code and containers for 130+ types of hardcoded secrets
Scans source code and containers for 130+ types of hardcoded secrets
Real-time threat detection & response for non-human identities (NHIs)
Real-time threat detection & response for non-human identities (NHIs)
Dark web monitoring platform for detecting exposed credentials and threats
Dark web monitoring platform for detecting exposed credentials and threats
Swiss-made darknet monitoring platform providing real-time threat intel via API
Swiss-made darknet monitoring platform providing real-time threat intel via API
Visual interface for exploring threat intelligence data sources and datasets
Visual interface for exploring threat intelligence data sources and datasets
Threat exposure mgmt platform monitoring dark web, clear web for leaked creds
Threat exposure mgmt platform monitoring dark web, clear web for leaked creds
Threat intelligence platform combining network security and threat exposure mgmt
Threat intelligence platform combining network security and threat exposure mgmt
Monitors Surface, Deep & Dark Web for data leaks and credential exposure
Monitors Surface, Deep & Dark Web for data leaks and credential exposure
Threat hunting platform for credentials, phishing, malicious domains & leaks
Threat hunting platform for credentials, phishing, malicious domains & leaks
Monitors Deep & Dark Web for threats, credentials, and fraud schemes
Monitors Deep & Dark Web for threats, credentials, and fraud schemes
Threat intelligence feeds for SOC teams from social, dark web & botnet sources
Threat intelligence feeds for SOC teams from social, dark web & botnet sources
Custom automation workflows for identity exposure data integration into SIEM/SOAR
Custom automation workflows for identity exposure data integration into SIEM/SOAR
Cyber threat intel platform monitoring dark web & cybercrime for org assets
Cyber threat intel platform monitoring dark web & cybercrime for org assets
Real-time identity protection monitoring compromised credentials on dark web
Real-time identity protection monitoring compromised credentials on dark web
Dark/deep web monitoring for data breaches and credential leaks
Dark/deep web monitoring for data breaches and credential leaks
Scans code repositories and runtime environments for exposed secrets and credentials
Scans code repositories and runtime environments for exposed secrets and credentials
Scans code for exposed API keys, credentials, and tokens in repos and CI/CD.
Scans code for exposed API keys, credentials, and tokens in repos and CI/CD.
AI-powered ITDR platform detecting identity attacks across hybrid environments
AI-powered ITDR platform detecting identity attacks across hybrid environments
AI-powered identity threat detection and response for cloud and SaaS environments
AI-powered identity threat detection and response for cloud and SaaS environments
Monitors surface, deep, dark web & social media for digital threats & brand risks
Monitors surface, deep, dark web & social media for digital threats & brand risks
Monitors dark web forums and marketplaces for leaked data and threats.
Monitors dark web forums and marketplaces for leaked data and threats.
API for monitoring identity theft across surface, deep, and dark web
API for monitoring identity theft across surface, deep, and dark web
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure