CybersecTools API access is now live!Learn More

Server

Browse 27 server tools

Enterprise SSH server for encrypted remote access & secure file transfer.

Secures cloud servers from APTs, malicious hardware, and insider threats.

Zero trust app allowlisting-based server endpoint protection for Windows.

Real-time threat detection & health monitoring for Windows/Exchange servers.

Automates server compliance scanning and risk analysis against security policies.

MFA-based RDP protection for servers to prevent ransomware intrusions.

Full-stack Linux server security platform for shared hosting providers.

AI-powered real-time malware detection and removal for Linux servers.

Server security tool providing encryption, access control & device visibility.

Korean cybersecurity firm offering mobile, network, app, and DB security products.

Server-based malware detection and removal platform for web hosting

Server-level malware detection and remediation for Linux servers and VPS

Web hosting security platform for threat detection, removal, and protection

Antivirus protection for server operating systems at desktop pricing

Server-side mobile app attestation verifying app integrity and API access

Email server application with groupware functions for Microsoft Windows

RMM software for MSPs to manage endpoints, patches, and remote access

Server security solution protecting file servers, SharePoint, and Linux systems

Cloud-based backup and recovery for endpoints, servers, and SaaS platforms

A malicious DNS server that executes DNS Rebinding attacks on-demand to bypass same-origin policy restrictions and access internal network resources.

A DICOM server with a twist, blocking C-STORE attempts for protection but logging them.

MockSSH is a testing tool that emulates operating systems behind SSH servers to enable automation testing without requiring access to real servers.

Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.

Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.