Eclypsium is a supply chain security platform that scans and monitors hardware, firmware, and software components in IT infrastructure. The platform provides: - Component-level inventory management and monitoring - Vulnerability detection in hardware and firmware components - Configuration assessment and hardening recommendations - Detection of firmware-level threats, rootkits, and bootkits - Integration capabilities with SIEM and ITSM systems - Compliance monitoring for firmware integrity and supply chain risk management The solution focuses on device integrity verification across various vendors including HP, Dell, Lenovo, and other major manufacturers, enabling organizations to verify the authenticity and security of their IT infrastructure components.
FEATURES
ALTERNATIVES
A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing, utilizing Message Query Language (MQL) for behavior description.
An Android-based self-defense application against forensic imaging tools like Cellebrite UFED.
MARA is a Mobile Application Reverse engineering and Analysis Framework with various features for testing mobile applications against OWASP mobile security threats.
Scans SPF and DMARC records for issues that could allow email spoofing.
House: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
A security testing framework for Android with tools to search for vulnerabilities and interact with the Android Runtime.
CHIPSEC is a framework for analyzing the security of PC platforms and components, with tools for low-level interfaces and forensic capabilities.
FSquaDRA is a tool for detection of repackaged Android applications based on Jaccard similarity computation over digests of files.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.