CybersecTools API access is now live!Learn More

Serverless

Browse 36 serverless tools

Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.

Cloud-native, AI-powered cyber range platform for cybersecurity training.

AWS-native malware scanning & data classification for S3 and other AWS storage.

Malware scanning solution for Azure Blob Storage with in-tenant detection.

Transparent data protection platform with encryption & tokenization for cloud envs.

SBOM generation tool for serverless functions across cloud platforms

Real-time runtime visibility platform for detecting active exploitation

Agent-based runtime firewall for web apps and APIs with AI-driven rules

Data management and security platform with discovery and classification tech.

Zero trust workload protection for VMs, containers, K8s, and serverless

API discovery tool that maps application attack surface from source code

Unified API and AI security platform for discovery, protection, and testing

Container and Kubernetes security platform with runtime visibility and detection

Real-time cloud threat detection, investigation, and response platform

Automated incident response platform for Microsoft 365 and identity systems

Cloud-based DDI (DNS, DHCP, IPAM) service for hybrid multi-cloud environments

Runtime protection for containers, K8s, serverless, and VMs in cloud environments

Security platform for serverless functions with vulnerability scanning & runtime

Malware scanning for cloud object storage and file services

Code to cloud security platform for app lifecycle protection

Comprehensive CNAPP solution with CSPM, CWPP, CDR, CIEM, and DevSecOps capabilities

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.

A serverless SOAR framework for AWS GuardDuty that automatically executes configurable response actions based on security findings and threat severity.