Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Software Security

Explore 7 curated cybersecurity tools, with 17,221+ visitors searching for solutions

CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Git-Vuln-Finder Logo

A tool that uses NLP and ML to identify potential software vulnerabilities from git commit messages

0
Secure Ruby Development Guide Logo

A guide to secure Ruby development, providing guidelines and recommendations for secure coding practices.

0
The Update Framework (TUF) Logo

A cryptographic framework that secures software update systems by enabling publishers to sign content offline and consumers to verify authenticity through trusted verification mechanisms.

0
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus Logo

A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

0
LavaMoat Logo

A set of tools for securing JavaScript projects against software supply chain attacks.

0
OWASP Foundation Logo

A non-profit organization focused on improving the security of software through resources and training.

0
Factual Rules Generator Logo

An open source tool that generates YARA rules from installed software on running operating systems for efficient software identification in digital forensic investigations.

0