Loading...
Browse 63 security analysis tools
SAST tool for analyzing Java and JavaScript/TypeScript applications
SAST tool for analyzing Java and JavaScript/TypeScript applications
FPGA bitstream security platform for encryption, authentication & hardening
FPGA bitstream security platform for encryption, authentication & hardening
Automated AI red teaming platform for testing GenAI apps, models & agents
Automated AI red teaming platform for testing GenAI apps, models & agents
Professional code auditing service for security, compliance, and quality
Professional code auditing service for security, compliance, and quality
Custom AI model testing and validation service for security and compliance
Custom AI model testing and validation service for security and compliance
Assesses org readiness for quantum computing threats to cryptographic systems
Assesses org readiness for quantum computing threats to cryptographic systems
Cybersecurity gap assessment service to identify program weaknesses
Cybersecurity gap assessment service to identify program weaknesses
Source code security review service for identifying vulnerabilities
Source code security review service for identifying vulnerabilities
Security audit certificate verification for blockchain smart contracts
Security audit certificate verification for blockchain smart contracts
BEC investigation service combining forensic experts with AI technology
BEC investigation service combining forensic experts with AI technology
IP core that detects and prevents Rowhammer attacks on memory systems
IP core that detects and prevents Rowhammer attacks on memory systems
Digital sensor IP for detecting fault injection attacks on hardware devices
Digital sensor IP for detecting fault injection attacks on hardware devices
Red Hand Analyzer is an online tool that provides automated behavioral analysis of PCAP files to detect malicious network activities and security vulnerabilities without decrypting traffic content.
Red Hand Analyzer is an online tool that provides automated behavioral analysis of PCAP files to detect malicious network activities and security vulnerabilities without decrypting traffic content.
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.
Automated security design review platform for developers
Automated security design review platform for developers
A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.
A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.
A security analysis tool that detects and analyzes open redirection vulnerabilities in web applications.
A security analysis tool that detects and analyzes open redirection vulnerabilities in web applications.
ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.
ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.
Access Undenied on AWS analyzes CloudTrail AccessDenied events to explain access denial reasons and provide least-privilege remediation suggestions.
Access Undenied on AWS analyzes CloudTrail AccessDenied events to explain access denial reasons and provide least-privilege remediation suggestions.
A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.
A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.
A security dataset and CTF platform available in full (16.4GB) and attack-only (3.2GB) versions, pre-indexed for Splunk to help security professionals practice analysis skills.
A security dataset and CTF platform available in full (16.4GB) and attack-only (3.2GB) versions, pre-indexed for Splunk to help security professionals practice analysis skills.
A tool for advanced HTTPD logfile security analysis and forensics, implementing various techniques to detect attacks against web applications.
A tool for advanced HTTPD logfile security analysis and forensics, implementing various techniques to detect attacks against web applications.
NodeSecure is a cybersecurity project that provides security monitoring and analysis capabilities specifically designed for Node.js applications.
NodeSecure is a cybersecurity project that provides security monitoring and analysis capabilities specifically designed for Node.js applications.
A cloud security assessment tool that collects cloud resource information, analyzes it against best practices, and generates compliance reports in multiple formats.
A cloud security assessment tool that collects cloud resource information, analyzes it against best practices, and generates compliance reports in multiple formats.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance