Redline is a free endpoint security tool that provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile. It allows users to collect, analyze and filter endpoint data and perform IOC analysis and hit review. Additionally, it integrates with FireEye's Endpoint Security (HX) to open triage collections directly for in-depth analysis. Redline runs on Windows only and is subject to the licensing and terms outlined in the freeware app.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Symantec Enterprise Cloud provides comprehensive cybersecurity for large enterprises, with a focus on data-centric hybrid security and innovation in threat and data protection.
A single cybersecurity platform that provides holistic security management, prevention, detection, and response capabilities powered by AI and threat intelligence, designed to simplify and converge security operations in diverse hybrid IT environments.
Cisco Secure Endpoint is a cloud-native endpoint security solution that provides advanced protection and response to threats.
Powerfully simple endpoint security solution that takes down threats without interrupting business.
A lightweight malware detection and removal tool that provides real-time protection against complex attacks while preserving system resources.
A simple ransomware protection that intercepts and kills malicious processes attempting to delete shadow copies using vssadmin.exe.
A comprehensive utility that shows what programs are configured to run during system bootup or login, and when you start various built-in Windows applications.
Comprehensive endpoint security solution providing proactive defenses, remediation tools, and centralized management to prevent threats and ensure uptime.
Webroot Endpoint Protection provides advanced cloud-based protection against malicious files, scripts, exploits, and URLs to keep businesses safe from cyberattacks.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.