Reporting

Explore 20 curated cybersecurity tools, with 14,519+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

PTJunior Logo

An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

2
Cydarm Logo

A case management platform for Security Operations Centers that enables collaborative incident response, workflow automation, and compliance reporting throughout the cybersecurity incident response lifecycle.

0
PlexTrac Logo

PlexTrac is a centralized platform for penetration test reporting and threat exposure management that helps security teams streamline assessment workflows, prioritize remediation, and track security posture improvements.

0
Cyver Core Logo

A pentest management platform that automates reporting workflows, provides client collaboration tools, and streamlines the entire penetration testing lifecycle from scoping to remediation.

0
Living Security Human Risk Management Platform Logo

A human risk management platform that identifies, assesses, and mitigates security risks associated with employee behavior through monitoring, targeted interventions, and comprehensive reporting.

0
Faraday Logo

A vulnerability management platform that centralizes security assessment workflows, integrates multiple security tools, and provides collaboration features for security teams.

0
Fabric Platform by BlackStork Logo

Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.

5
Bleeping Computer Logo

A customizable offensive security reporting solution for pentesters and red teamers to generate detailed reports of their findings and vulnerabilities.

0
PacBot Logo

PacBot is a cloud security platform that provides continuous compliance monitoring, automated policy enforcement, and security reporting through policy-as-code implementation and multi-source data integration.

0
AWS Artifact Logo

On-demand access to AWS and ISV compliance reports with time-saving benefits.

0
Cloud Reports Logo

A cloud security assessment tool that collects cloud resource information, analyzes it against best practices, and generates compliance reports in multiple formats.

0
Nipper-ng Logo

A next-generation network scanner for identifying security configuration weaknesses in devices like routers, firewalls, and switches.

0
Sysreptor Logo

A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.

0
The Penetration Testing Execution Standard Logo

A standard for conducting penetration tests, covering seven main sections from planning to reporting.

0
Ice Logo

Ice is an AWS cloud cost management tool that provides multi-level visibility into cloud spending and resource utilization to support informed reservation purchases and resource optimization decisions.

0
GRASSMARLIN Logo

Passively maps and visually displays ICS/SCADA network topology for network security

0
PlumHound Logo

PlumHound is a reporting engine that converts BloodHoundAD's Neo4J queries into operational security reports for analyzing Active Directory vulnerabilities and attack paths.

0
NotifySecurity Logo

An Outlook add-in that enables one-click reporting of suspicious emails to security teams with integrated statistics tracking and SMTP header collection.

0
rpCheckup Logo

rpCheckup is an AWS resource policy security analysis tool that identifies public, external, intra-organizational, and private resource access patterns across AWS accounts.

0
PANORAMA Logo

Generate comprehensive reports about Windows systems with detailed system, security, networking, and USB information.

0