Loading...
Explore 38 curated cybersecurity tools, with 15,190 visitors searching for solutions
Vehicle cybersecurity intrusion detection for commercial fleets and OEMs
Vehicle cybersecurity intrusion detection for commercial fleets and OEMs
Open source Suricata-based NDR system with threat detection and analysis
Open source Suricata-based NDR system with threat detection and analysis
GRC platform with security, compliance, and business continuity management
GRC platform with security, compliance, and business continuity management
OT network security solution for industrial environments
OT network security solution for industrial environments
Network traffic analysis tool for real-time intrusion detection and monitoring
Network traffic analysis tool for real-time intrusion detection and monitoring
NGFW with threat protection, app visibility, and AI-driven security
NGFW with threat protection, app visibility, and AI-driven security
Enterprise endpoint protection platform with ML-driven threat detection
Enterprise endpoint protection platform with ML-driven threat detection
Network detection and response platform for threat detection and analysis
Network detection and response platform for threat detection and analysis
Inline network detection and response system with IPS capabilities
Inline network detection and response system with IPS capabilities
Runtime security for physical, virtual, cloud, and container workloads
Runtime security for physical, virtual, cloud, and container workloads
IPS with inline AI models to block zero-day exploits and C2 attacks in real time
IPS with inline AI models to block zero-day exploits and C2 attacks in real time
A next-generation intrusion prevention system that combines signature-based and behavioral detection techniques to identify and block sophisticated network threats across hybrid environments.
A next-generation intrusion prevention system that combines signature-based and behavioral detection techniques to identify and block sophisticated network threats across hybrid environments.
Cloud-native deception platform deploying dynamic security canaries
Cloud-native deception platform deploying dynamic security canaries
A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.
A low-interaction honeypot that simulates network services to detect and monitor potential intrusion attempts on internal networks.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
Fail2ban is a daemon that automatically bans IP addresses showing malicious behavior by monitoring log files and updating firewall rules to prevent brute-force attacks.
Fail2ban is a daemon that automatically bans IP addresses showing malicious behavior by monitoring log files and updating firewall rules to prevent brute-force attacks.
DECAF++ is a fast whole-system dynamic taint analysis framework with improved performance and elasticity.
DECAF++ is a fast whole-system dynamic taint analysis framework with improved performance and elasticity.
GRFICS is a Unity 3D-based framework that provides a virtual industrial control system environment for practicing ICS security attacks and defenses with visual feedback.
GRFICS is a Unity 3D-based framework that provides a virtual industrial control system environment for practicing ICS security attacks and defenses with visual feedback.
An open-source network security monitoring tool.
An OpenFlow honeypot that detects unused IP addresses and simulates network traffic to attract and analyze potential threats
An OpenFlow honeypot that detects unused IP addresses and simulates network traffic to attract and analyze potential threats
BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance for network monitoring and intrusion detection applications.
BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance for network monitoring and intrusion detection applications.
A fake Django admin login screen to detect and notify admins of attempted unauthorized access
A fake Django admin login screen to detect and notify admins of attempted unauthorized access
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure