Security

Explore 130 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Monokee Logo

Monokee is an identity orchestration and access management platform that provides visual, low-code tools for designing authentication workflows, managing digital identities, and implementing secure access controls across multiple domains.

0
Ping Identity Platform Logo

The Ping Identity Platform is an enterprise identity and access management solution that provides authentication, authorization, and identity governance capabilities with flexible deployment options for securing customer, workforce, and partner identities.

0
Okta Customer Identity Cloud Logo

Okta Customer Identity Cloud is a CIAM solution that provides secure, customizable identity management for consumer and SaaS applications.

1
Cloudflare Learning Center Logo

The Cloudflare Learning Center provides educational resources covering various cybersecurity and internet-related topics, including DDoS attacks, CDNs, DNS, web application security, serverless computing, encryption protocols, bots, cloud computing, Zero Trust security, SASE, networking, data privacy, video streaming, email security, and AI.

0
LLM Guard Logo

LLM Guard is a security toolkit that enhances the safety and security of interactions with Large Language Models (LLMs) by providing features like sanitization, harmful language detection, data leakage prevention, and resistance against prompt injection attacks.

1
Adversa AI Logo

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

0
CalypsoAI Logo

CalypsoAI is a platform that provides centralized security, observability, and control for deploying and scaling large language models and generative AI across an enterprise.

0
WhyLabs LLM Security Logo

WhyLabs is a platform that provides security, monitoring, and observability capabilities for Large Language Models (LLMs) and AI applications, enabling teams to protect against malicious prompts, data leaks, misinformation, and other vulnerabilities.

0
Kunai Logo

Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.

0
Radare2 Logo

A powerful reverse engineering framework

1
haktrails Logo

Golang client for querying SecurityTrails API data

0
LinkFinder Logo

A Python script that finds endpoints in JavaScript files to identify potential security vulnerabilities.

0
Android Security Awesome Logo

A collection of Android security related resources

0
Fibratus Logo

A modern tool for Windows kernel exploration and observability with a focus on security.

0
Application Gateway Logo

Load-balancing solution by Microsoft Azure with global infrastructure and financial guidance.

0
Hapi Logo

Hapi is a Node.js web application framework that provides built-in functionality for building scalable server-side applications and APIs with security features and plugin architecture.

0
Stack Honeypot Logo

A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots

0
Hardening OpenLDAP on Linux with AppArmor and systemd Logo

A comprehensive guide to hardening OpenLDAP on Linux using AppArmor and systemd, providing a defense in depth approach to securing LDAP deployments.

0
PHP: The Right Way Logo

Comprehensive guide on best practices for PHP development.

0
Tor Detect Middleware Logo

Express middleware for detecting and redirecting Tor or Surface users.

0
awesome-mobile-security Logo

A collection of mobile security resources and tools

0
Stronghold Logo

Stronghold is the easiest way to securely configure your Mac.

0
Quad9 Logo

A free DNS recursive service that blocks malicious host names and protects user privacy.

0
Bad Pods Logo

Collection of Kubernetes manifests creating pods with elevated privileges for security testing.

0