Security Analysis

Explore 63 curated cybersecurity tools, with 14,237+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Red Hand Analyzer Logo

Red Hand Analyzer is an online tool that provides automated behavioral analysis of PCAP files to detect malicious network activities and security vulnerabilities without decrypting traffic content.

1
 Verax AI Logo

A platform that provides visibility, monitoring, and control over Large Language Models (LLMs) in production environments to detect and mitigate risks like hallucinations and data leakage.

0
Equixly API Security Platform Logo

An AI-powered API security testing platform that performs continuous vulnerability assessment, attack surface mapping, and compliance monitoring of API endpoints.

0
Symbiotic Security Logo

An IDE-integrated AI security solution that detects, remediates, and educates about code vulnerabilities in real-time as developers write code.

0
MazeBolt RADAR Logo

An automated DDoS vulnerability testing platform that continuously evaluates DDoS protection systems without causing operational downtime.

0
BeVigil Enterprise Logo

An attack surface management platform that discovers, maps, and monitors an organization's external digital assets to identify vulnerabilities and security weaknesses before they can be exploited.

0
Apiiro ASPM Platform Logo

Apiiro ASPM Platform is an application security solution that provides code-to-runtime visibility, risk assessment, and remediation capabilities to help organizations manage and reduce security risks across their application portfolio.

0
XRATOR Logo

XRATOR is a cybersecurity platform that continuously identifies vulnerabilities, assesses business risks, and manages security posture to align with strategic objectives and compliance requirements.

0
Cloudflare API Shield Logo

An API security and monitoring platform that automatically discovers, validates, and protects API endpoints while providing comprehensive management and analytics capabilities.

0
Edge Solution Logo

A cyber risk management platform that financially quantifies cyber risks and provides actionable mitigation strategies while integrating with insurance coverage.

0
Ghost Platform Logo

An AI-powered application security platform that provides automated discovery, testing, and continuous monitoring of applications and APIs with minimal operational impact.

0
Heeler Logo

An application security platform that provides runtime threat modeling, vulnerability management, and automated remediation workflows with a focus on identifying exploitable vulnerabilities in production environments.

0
Bima Scanner Logo

An automated web application security scanner that evaluates JavaScript library vulnerabilities and HTTP security headers to assess website security posture.

1
Amplify Logo

An automated code remediation tool that integrates with source control platforms to automatically fix security vulnerabilities in code through AI-driven analysis and one-click implementations.

0
Phoenix Logo

An application security platform that aggregates, prioritizes and contextualizes vulnerabilities from multiple security scanners and sources to help manage application and cloud security risks.

0
Exposing Security Observability Gaps in AWS Native Security Tooling Logo

A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

0
Oralyzer Logo

A security analysis tool that detects and analyzes open redirection vulnerabilities in web applications.

0
ConventionEngine Logo

ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.

0
Access Undenied on AWS Logo

Access Undenied on AWS analyzes CloudTrail AccessDenied events to explain access denial reasons and provide least-privilege remediation suggestions.

0
Conmachi Container Scanner Logo

A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.

0
Boss of the SOC (BOTS) Dataset Version 2 Logo

A security dataset and CTF platform available in full (16.4GB) and attack-only (3.2GB) versions, pre-indexed for Splunk to help security professionals practice analysis skills.

0
LORG Logo

A tool for advanced HTTPD logfile security analysis and forensics, implementing various techniques to detect attacks against web applications.

0
NodeSecure Logo

NodeSecure is a cybersecurity project that provides security monitoring and analysis capabilities specifically designed for Node.js applications.

0
Cloud Reports Logo

A cloud security assessment tool that collects cloud resource information, analyzes it against best practices, and generates compliance reports in multiple formats.

0