Security Research

Browse 114 security research tools

CARL - Cybersecurity Applied Research Lab Logo

Research lab testing cyber tech & monitoring threat feeds for security recs

0
Unit221B eWitness Logo

Threat intel platform for discovering cybercrime on encrypted chat networks

0
SlowMist Blockchain Security Audit Logo

Blockchain security audit service for public chains and crypto exchanges

0
SlowMist Smart Contract Security Audit Logo

Smart contract security audit service for blockchain platforms

0
SlowMist Security Audit Certificate Logo

Security audit certificate verification for blockchain smart contracts

0
DSShield Application Security Audit Logo

Application security assessment service using OWASP and OSSTMM standards

0
depthfirst labs Logo

AI-powered vulnerability discovery and automated patching for open-source code

0
Nightwing DejaVM Logo

Whole-system emulation environment for software dev, debugging, testing & security

0
Zerocopter CVD Program Logo

Managed CVD program for external vulnerability reporting and validation

0
YesWeHack Live Hacking Event Logo

Organized live bug bounty competitions with ethical hackers

0
VerSprite Analyzing CVE-2019-1436 Logo

Security research lab publishing vulnerability analyses and exploit research

0
IOActive Supply Chain Security Logo

Supply chain security assessment and consulting services

0
IOActive Secure Development Lifecycle Logo

Secure development lifecycle consulting for hardware, software & IoT products

0
Intigriti Live Hacking Event Logo

Organized live hacking events connecting security researchers with orgs

0
Intigriti Managed VDP Logo

Managed vulnerability disclosure program platform for coordinated security

0
Galois Post-Quantum Cryptography Logo

Post-quantum cryptography solutions by Galois

0
Bugcrowd Platform Logo

Crowdsourced security platform for bug bounty, pentesting, and vuln disclosure

0
Bugcrowd Vulnerability Disclosure Program (VDP) Logo

Managed vulnerability disclosure program platform for coordinated reporting

0
OpenAI GenAI Logo

Article discussing malicious use of GenAI and security protections

0
HarfangLab HijackServer Logo

Cybersecurity research blog covering threat intelligence and malware analysis

0
Miggo Predictive Vulnerability Database Logo

Vulnerability intelligence database with CVE analysis and prioritization

0
OPSWAT 2025 SANS ICS/OT Cybersecurity Report Logo

SANS survey report on ICS/OT cybersecurity detection and response practices

0
WatchGuard The 443 Logo

Cybersecurity podcast covering threat analysis and security trends

0
ISE Vulnerability Assessment Services Logo

Manual vulnerability assessment services with custom exploit development

0