Security Audit

Explore 73 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
ManageEngine Firewall Analyzer Logo

Firewall log analysis, bandwidth monitoring, and traffic analysis capabilities

0
ManageEngine ADManager Plus Logo

Manage, secure, and report on AD, Microsoft 365, and Google Workspace environments

0
ManageEngine ADAudit Plus Logo

Active Directory auditing and reporting solution that monitors AD changes

0
XYPRO SQLXPress Logo

Windows-based GUI for managing HPE NonStop SQL/MX and SQL/MP databases

0
XYPRO WASL - Secure the Core Logo

Automated security and compliance solution for SAP HANA databases

0
Entersoft Web Application Security Logo

A comprehensive application security service provider offering manual penetration testing, vulnerability assessment, and security solutions across various industries.

0
audius Security and Audit Services Logo

A comprehensive cybersecurity consulting service offering security assessments, risk analysis, and implementation of tailored information security management systems for organizations.

0
weSecretFinder Logo

A Python script that scans file systems to identify hardcoded credentials, API keys, and other sensitive secrets using configurable regex patterns.

0
CMMC Resources Logo

A compliance management platform that simplifies CMMC Level 1 certification for defense contractors through guided workflows, policy templates, and evidence management tools.

0
Network Intelligence Logo

Network Intelligence is a cybersecurity services provider offering comprehensive security solutions through their ADVISE framework, including detection and response, compliance, data privacy, and secure digital transformation services across multiple industries.

0
ScubaGear Logo

ScubaGear is a PowerShell-based assessment tool that evaluates Microsoft 365 tenant configurations against CISA security baselines using Open Policy Agent and generates compliance reports.

0
Securden Unified PAM Logo

A powerful tool that enables organizations to discover, manage, and secure privileged access, helping to reduce the risks associated with privileged accounts and activities.

1
gitGraber Logo

Monitor GitHub for sensitive data

0
liffier Logo

A simple snippet to increment ../ on the URL.

0
s3viewer Logo

A storage exploration tool that provides unified access to view publicly accessible Amazon S3 buckets, Azure Blob storage, FTP servers, and HTTP directory listings.

0
s3tk Logo

A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.

0
s3_objects_check Logo

A security tool that performs whitebox evaluation of S3 object permissions to identify publicly accessible files and generate reports on potential exposure risks.

0
Talisman Logo

Pre-commit hook for validating outgoing changeset

0
s3cario Logo

S3cario is an AWS S3 bucket security testing tool that validates permissions and identifies potential vulnerabilities through scenario simulation.

0
Dorothy Logo

Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.

0
EarlyBird Logo

A sensitive data detection tool for scanning source code repositories

0
Prowler Logo

Prowler is an open source multi-cloud security assessment tool that performs audits, compliance checks, and security evaluations across AWS, Azure, GCP, and Kubernetes environments.

0
Enumerate IAM Permissions Logo

A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.

0
Nikto Logo

Web server scanner for identifying security vulnerabilities.

0