Loading...
Browse 128 security tools
Hardware wallet for cryptocurrency storage and management
Quantum random number generator using photon detection for cryptography
Quantum random number generator using photon detection for cryptography
FHE-based solution securing AI models and data throughout training and inference
FHE-based solution securing AI models and data throughout training and inference
Specialized cryptography IP for FHE, LWC, PBC, and WBC implementations
Specialized cryptography IP for FHE, LWC, PBC, and WBC implementations
Content security solution from SecuLetter (product page unavailable)
Content security solution from SecuLetter (product page unavailable)
Oracle Access Governance is an identity and access management solution that helps organizations control, monitor, and audit user access privileges across their IT environment.
Oracle Access Governance is an identity and access management solution that helps organizations control, monitor, and audit user access privileges across their IT environment.
The Cloudflare Learning Center provides educational resources covering various cybersecurity and internet-related topics, including DDoS attacks, CDNs, DNS, web application security, serverless computing, encryption protocols, bots, cloud computing, Zero Trust security, SASE, networking, data privacy, video streaming, email security, and AI.
The Cloudflare Learning Center provides educational resources covering various cybersecurity and internet-related topics, including DDoS attacks, CDNs, DNS, web application security, serverless computing, encryption protocols, bots, cloud computing, Zero Trust security, SASE, networking, data privacy, video streaming, email security, and AI.
LLM Guard is a security toolkit that enhances the safety and security of interactions with Large Language Models (LLMs) by providing features like sanitization, harmful language detection, data leakage prevention, and resistance against prompt injection attacks.
LLM Guard is a security toolkit that enhances the safety and security of interactions with Large Language Models (LLMs) by providing features like sanitization, harmful language detection, data leakage prevention, and resistance against prompt injection attacks.
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
A powerful reverse engineering framework
Golang client for querying SecurityTrails API data
A Python script that finds endpoints in JavaScript files to identify potential security vulnerabilities.
A Python script that finds endpoints in JavaScript files to identify potential security vulnerabilities.
A modern tool for Windows kernel exploration and observability with a focus on security.
A modern tool for Windows kernel exploration and observability with a focus on security.
Load-balancing solution by Microsoft Azure with global infrastructure and financial guidance.
Load-balancing solution by Microsoft Azure with global infrastructure and financial guidance.
Hapi is a Node.js web application framework that provides built-in functionality for building scalable server-side applications and APIs with security features and plugin architecture.
Hapi is a Node.js web application framework that provides built-in functionality for building scalable server-side applications and APIs with security features and plugin architecture.
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.
Express middleware for detecting and redirecting Tor or Surface users.
Express middleware for detecting and redirecting Tor or Surface users.
A collection of mobile security resources and tools
Stronghold is the easiest way to securely configure your Mac.
A free DNS recursive service that blocks malicious host names and protects user privacy.
A free DNS recursive service that blocks malicious host names and protects user privacy.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance