Loading...
Explore 251 curated cybersecurity tools, with 15,161 visitors searching for solutions
Scans open-source licenses in dependencies and generates SBOMs for compliance
Scans open-source licenses in dependencies and generates SBOMs for compliance
Detects malicious open-source packages across SDLC using 410K+ package database
Detects malicious open-source packages across SDLC using 410K+ package database
SCA tool for identifying & remediating open-source vulnerabilities & risks
SCA tool for identifying & remediating open-source vulnerabilities & risks
SCA tool detecting vulnerabilities in third-party libraries at runtime & build
SCA tool detecting vulnerabilities in third-party libraries at runtime & build
Open-source log collection, processing, and forwarding tool for log management
Open-source log collection, processing, and forwarding tool for log management
Search AI platform with vector database for logs, threat hunting, and AI apps
Search AI platform with vector database for logs, threat hunting, and AI apps
Distributed search and analytics engine for real-time data storage and retrieval
Distributed search and analytics engine for real-time data storage and retrieval
GRC platform for managing cyber security programs, compliance, and risk assessment
GRC platform for managing cyber security programs, compliance, and risk assessment
Open source SIEM and XDR platform for real-time threat detection and response
Open source SIEM and XDR platform for real-time threat detection and response
Open source network security monitoring tool for traffic analysis
Open source network security monitoring tool for traffic analysis
Open-source detection rules for email attacks like BEC, phishing, and malware
Open-source detection rules for email attacks like BEC, phishing, and malware
IDE plugin for SAST and SCA scanning with real-time vulnerability detection
IDE plugin for SAST and SCA scanning with real-time vulnerability detection
AI-powered code analysis platform for security, quality, and developer insights
AI-powered code analysis platform for security, quality, and developer insights
SCA tool for code scanning, license identification, and SBOM generation
SCA tool for code scanning, license identification, and SBOM generation
SCA platform for managing open source vulnerabilities across SDLC
SCA platform for managing open source vulnerabilities across SDLC
SCA tool for identifying vulnerabilities in open-source dependencies
SCA tool for identifying vulnerabilities in open-source dependencies
Automated SCA tool for open source dependency management and vulnerability remediation
Automated SCA tool for open source dependency management and vulnerability remediation
Post-quantum cryptography library with NIST-standardized algorithms
Post-quantum cryptography library with NIST-standardized algorithms
Vulnerability detection dataset for declared & undeclared dependencies in code
Vulnerability detection dataset for declared & undeclared dependencies in code
Open source license compliance dataset for detecting code snippets & obligations
Open source license compliance dataset for detecting code snippets & obligations
Identifies geographic origin and authorship of open source code components
Identifies geographic origin and authorship of open source code components
OpenSCA Project is a dependency security scanner that runs in the browser.
OpenSCA Project is a dependency security scanner that runs in the browser.
Searchable repository of Sigma detection rules for threat hunting and SIEM
Searchable repository of Sigma detection rules for threat hunting and SIEM
Malware detection across SDLC, DevOps pipelines, and open-source components
Malware detection across SDLC, DevOps pipelines, and open-source components
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure