Visualization

Explore 30 curated cybersecurity tools, with 15,627 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

Zeronsec Threat Intelligence Logo

Threat intelligence platform for detection, hunting, and remediation

0
Blackwired ThirdWatch Logo

3D cyber threat visualization platform for external threat monitoring

0
Kanvas Logo

An open-source incident response case management tool that provides visualization, threat intelligence lookups, and security framework mapping in a unified workspace.

0
Granef Logo

A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.

0
postMessage-tracker Logo

Track postMessage usage with this Chrome Extension

0
Acapulco (Attack Community grAPh COnstruction) Logo

A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.

0
Aaia Logo

Aaia visualizes AWS IAM and Organizations data in Neo4j graph format to help identify security outliers and conduct privilege escalation analysis through Cypher queries.

0
PacBot Logo

PacBot is a cloud security platform that provides continuous compliance monitoring, automated policy enforcement, and security reporting through policy-as-code implementation and multi-source data integration.

0
ATT&CK® Navigator Logo

A web-based visualization tool for navigating and annotating MITRE ATT&CK matrices to support threat analysis, defensive planning, and security coverage assessment.

0
RedEye Logo

RedEye is a visual analytic tool that provides enhanced situational awareness and operational insights for both Red and Blue Team cybersecurity operations.

0
aws-summarize-account-activity Logo

A Python tool that analyzes AWS CloudTrail data to summarize IAM principal activities, API calls, regions, IP addresses, and user agents with configurable timeframes and visualization options.

0
OSTrICa Logo

OSTrICa is an open source plugin-based framework that collects and visualizes threat intelligence data from various sources to help cybersecurity professionals correlate IoCs and enhance their defensive capabilities.

0
AfterGlow Cloud Logo

AfterGlow Cloud is a Django-based web application that allows users to upload data and generate graph visualizations through a browser interface.

0
Starbase Logo

Starbase is a graph-based security analysis platform that provides automated asset discovery and relationship mapping across external services and systems to enhance attack surface visibility.

0
mhn-core-docker Logo

A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.

0
visualize_logs Logo

A Python library and command line tool that creates interactive visualizations for log data analysis with zoom and navigation capabilities.

0
HoneyMap Logo

Web application for visualizing live GPS locations on an SVG world map using honeypot captures.

0
AfterGlow Logo

Visualize and analyze network relationships with AfterGlow

0
Active Directory Control Paths Logo

A tool for analyzing and visualizing control relationships and privilege escalation paths within Active Directory environments using graph-based representations.

0
Hiryu Logo

A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.

0
HpfeedsHoneyGraph Logo

HpfeedsHoneyGraph is a visualization application that creates graphical representations of hpfeeds logs to aid cybersecurity analysis of honeypot data.

0
Weave Scope Logo

Weave Scope is a real-time visualization and monitoring tool that automatically maps Docker container infrastructures and microservices, providing interactive topology views and direct container management capabilities.

0
DroidBox Logo

DroidBox is a dynamic analysis framework for Android applications that monitors runtime behavior, network activity, file operations, and security events while generating behavioral visualizations.

0
cowrie2neo Logo

cowrie2neo parses Cowrie honeypot logs and imports the data into Neo4j databases for graph-based analysis and visualization of honeypot interactions.

0