Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Rule Based

Explore 7 curated cybersecurity tools, with 17,628+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
qsfuzz Logo

qsfuzz is a rule-based fuzzing tool for testing query string parameters in web applications to identify security vulnerabilities.

0
yara-rules Logo

A repository of YARA rules for identifying and classifying malware through pattern-based detection.

0
Naxsi Logo

NAXSI is a third-party nginx module that prevents XSS and SQL injection attacks by filtering HTTP traffic based on predefined security rules.

0
AWS Web Application Firewalls (WAFs) Logo

AWS Web Application Firewalls (WAFs) are cloud-based security services that protect web applications and APIs from internet-based attacks through customizable filtering rules and centralized management capabilities.

0
snort Logo

Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.

0
Yara File Checker Logo

A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.

0
YARA Logo

YARA is a tool for identifying and classifying malware samples based on textual or binary patterns.

0