Security Tools & Technology
Comprehensive collection of 120+ cutting-edge cybersecurity tools, software, and technologies to enhance your security posture and defend against modern threats.
Nmap
Network discovery and security auditing tool used for network exploration and vulnerability scanning.
Platforms
Windows Linux macOS FreeBSD SolarisKey Features
- Port scanning and host discovery
- Operating system detection
- Service version detection
- and 3 more...
Use Cases
Network mapping Vulnerability assessment Security auditing Network inventoryWireshark
Network protocol analyzer that captures and displays network traffic in real-time for troubleshooting and security analysis.
Platforms
Windows Linux macOS FreeBSD SolarisKey Features
- Live packet capture and offline analysis
- Deep inspection of hundreds of protocols
- Multi-platform support
- and 3 more...
Use Cases
Network troubleshooting Security analysis Protocol development EducationMetasploit
Comprehensive penetration testing framework that helps security professionals find, exploit, and validate vulnerabilities.
Platforms
Windows Linux macOSKey Features
- Extensive exploit database (2000+ exploits)
- Payload generation and encoding
- Post-exploitation modules
- and 3 more...
Use Cases
Penetration testing Vulnerability assessment Security research Red team operationsBurp Suite
Industry-leading web application security testing platform with tools for manual and automated security testing.
Platforms
Windows Linux macOSKey Features
- Intercepting proxy with SSL/TLS support
- Web vulnerability scanner
- Application-aware spider
- and 3 more...
Use Cases
Web app penetration testing API security testing OWASP Top 10 testing Bug bounty huntingOWASP ZAP
Open source web application security scanner designed for finding vulnerabilities in web applications during development and testing.
Platforms
Windows Linux macOSKey Features
- Automated web app scanning
- Manual testing tools
- RESTful API support
- and 3 more...
Use Cases
Web application testing API security testing DevSecOps integration Security trainingSplunk
Leading platform for searching, monitoring, and analyzing machine-generated data for security and operational intelligence.
Platforms
Windows Linux Solaris macOSKey Features
- Real-time data ingestion and indexing
- Machine learning-based analytics
- Advanced correlation and alerting
- and 3 more...
Use Cases
Security monitoring Compliance reporting Incident investigation Operational intelligenceKali Linux
Debian-based Linux distribution specifically designed for digital forensics and penetration testing.
Platforms
x86 x64 ARM ARM64Key Features
- 600+ pre-installed security tools
- Forensics mode for evidence preservation
- Live boot capability
- and 3 more...
Use Cases
Penetration testing Digital forensics Security research Malware analysis1Password
Advanced password manager that securely stores and manages passwords, credit cards, and other sensitive information for individuals and teams.
Platforms
Windows Linux macOS iOS Android Chrome OSKey Features
- AES-256 encryption
- Secure password generation
- Biometric authentication
- and 3 more...
Use Cases
Password management Secure sharing Identity protection ComplianceSnort
Open source network intrusion detection system capable of performing real-time traffic analysis and packet logging.
Platforms
Windows Linux FreeBSD macOSKey Features
- Real-time traffic analysis
- Protocol analysis and content searching
- Flexible rule-based detection
- and 3 more...
Use Cases
Intrusion detection Network monitoring Threat hunting ComplianceSuricata
High-performance network threat detection engine that provides intrusion detection, prevention, and network security monitoring.
Platforms
Linux Windows FreeBSD macOSKey Features
- Multi-threaded architecture
- HTTP and TLS inspection
- File extraction and analysis
- and 3 more...
Use Cases
Network security monitoring Threat detection Malware analysis ComplianceNessus
Comprehensive vulnerability scanner that identifies security vulnerabilities, configuration issues, and malware across networks.
Platforms
Windows Linux macOS FreeBSDKey Features
- 180,000+ vulnerability checks
- Configuration and compliance auditing
- Web application scanning
- and 3 more...
Use Cases
Vulnerability assessment Compliance auditing Risk management Security monitoringOpenVAS
Open source vulnerability scanner and management solution that provides comprehensive security testing capabilities.
Platforms
LinuxKey Features
- 50,000+ network vulnerability tests
- Authenticated and unauthenticated scanning
- Web-based management interface
- and 3 more...
Use Cases
Vulnerability assessment Security auditing Compliance checking Network monitoringJohn the Ripper
Fast password cracker that supports hundreds of hash and cipher types, available on many operating systems.
Platforms
Windows Linux macOS Unix variantsKey Features
- Support for hundreds of hash types
- Dictionary and brute-force attacks
- Incremental mode attacks
- and 3 more...
Use Cases
Password auditing Security testing Digital forensics Penetration testingHashcat
Advanced password recovery tool that uses GPU acceleration to crack password hashes at unprecedented speeds.
Platforms
Windows Linux macOSKey Features
- GPU acceleration support
- 300+ hash algorithm support
- Multiple attack modes
- and 3 more...
Use Cases
Password auditing Security research Digital forensics Penetration testingAircrack-ng
Complete suite of tools to assess WiFi network security, including packet capture, WEP/WPA cracking, and network analysis.
Platforms
Windows Linux macOS AndroidKey Features
- WEP and WPA/WPA2 cracking
- Packet capture and injection
- WiFi network scanning
- and 3 more...
Use Cases
WiFi security testing Penetration testing Network auditing Security researchMaltego
Open source intelligence and graphical link analysis tool for gathering and connecting information for investigative tasks.
Platforms
Windows Linux macOSKey Features
- Visual link analysis
- Data mining and OSINT gathering
- Social network analysis
- and 3 more...
Use Cases
OSINT investigations Social network analysis Threat intelligence Digital forensicsShodan
Search engine for Internet-connected devices that provides reconnaissance capabilities for security professionals.
Platforms
Web-based API Command-lineKey Features
- Internet-wide device scanning
- Real-time monitoring
- Vulnerability tracking
- and 3 more...
Use Cases
Attack surface management Threat intelligence Security research Asset discoveryNikto
Open source web server scanner that performs comprehensive tests against web servers for multiple items including dangerous files and programs.
Platforms
Windows Linux macOSKey Features
- 6700+ potentially dangerous files/programs
- SSL support and certificate checking
- Proxy support
- and 3 more...
Use Cases
Web server security testing Vulnerability assessment Penetration testing Compliance auditingDirb
Web content scanner that looks for existing web objects by launching dictionary-based attacks against web servers.
Platforms
Windows Linux macOSKey Features
- Dictionary-based web content discovery
- Recursive directory scanning
- HTTP authentication support
- and 3 more...
Use Cases
Web application testing Directory enumeration Hidden content discovery Penetration testingGobuster
Fast directory/file and DNS subdomain brute-forcer written in Go for discovering hidden web content and subdomains.
Platforms
Windows Linux macOSKey Features
- Directory and file brute-forcing
- DNS subdomain enumeration
- Virtual host discovery
- and 3 more...
Use Cases
Web enumeration Subdomain discovery Hidden content finding Penetration testingSQLmap
Automatic SQL injection and database takeover tool that automates the process of detecting and exploiting SQL injection flaws.
Platforms
Windows Linux macOSKey Features
- Automatic SQL injection detection
- Database fingerprinting
- Data extraction capabilities
- and 3 more...
Use Cases
SQL injection testing Database security assessment Penetration testing Security researchBeEF
Browser Exploitation Framework that focuses on leveraging browser vulnerabilities to assess the actual security posture of a target.
Platforms
Windows Linux macOSKey Features
- Browser-based exploitation
- Social engineering modules
- Network discovery from browser
- and 3 more...
Use Cases
Browser security testing Social engineering assessment Client-side penetration testing Security awarenessYARA
Pattern matching engine aimed at helping malware researchers identify and classify malware samples through rule-based detection.
Platforms
Windows Linux macOSKey Features
- Pattern matching engine
- Flexible rule syntax
- String and binary pattern detection
- and 3 more...
Use Cases
Malware detection Threat hunting Digital forensics Incident responseVolatility
Advanced memory forensics framework for incident response and malware analysis through memory dump analysis.
Platforms
Windows Linux macOSKey Features
- Memory dump analysis
- Process and network analysis
- Registry and file system reconstruction
- and 3 more...
Use Cases
Memory forensics Malware analysis Incident response Digital investigationsAutopsy
Digital forensics platform that provides a graphical interface to The Sleuth Kit and other digital forensics tools.
Platforms
Windows LinuxKey Features
- Timeline analysis
- Keyword searching
- Web artifacts analysis
- and 3 more...
Use Cases
Digital forensics Incident investigation Data recovery Legal investigationsGhidra
Software reverse engineering framework developed by NSA that includes a suite of powerful software analysis tools.
Platforms
Windows Linux macOSKey Features
- Disassembly and decompilation
- Interactive graphical interface
- Collaborative reverse engineering
- and 3 more...
Use Cases
Malware analysis Software reverse engineering Vulnerability research Digital forensicsIDA Pro
Industry-standard interactive disassembler and debugger for reverse engineering software and malware analysis.
Platforms
Windows Linux macOSKey Features
- Advanced disassembly engine
- Interactive debugging
- Hex-Rays decompiler support
- and 3 more...
Use Cases
Malware analysis Vulnerability research Software reverse engineering Digital forensicsRadare2
Open source framework for reverse engineering and analyzing binaries with support for many architectures and file formats.
Platforms
Windows Linux macOS AndroidKey Features
- Disassembler and debugger
- Binary analysis framework
- Scripting and automation
- and 3 more...
Use Cases
Reverse engineering Malware analysis Binary analysis Exploit developmentElastic Stack (ELK)
Collection of open source tools (Elasticsearch, Logstash, Kibana) for searching, analyzing, and visualizing log data in real time.
Platforms
Windows Linux macOS CloudKey Features
- Distributed search and analytics
- Real-time data ingestion
- Interactive visualizations
- and 3 more...
Use Cases
Log analysis Security monitoring Application monitoring Business analyticsSecurity Onion
Linux distribution for intrusion detection, network security monitoring, and log management with integrated security tools.
Platforms
LinuxKey Features
- Full packet capture
- Network-based and host-based intrusion detection
- Powerful search capabilities
- and 3 more...
Use Cases
Network security monitoring Threat hunting Incident response Security researchNexpose
Comprehensive vulnerability management solution that discovers, prioritizes, and helps remediate security vulnerabilities across the entire IT environment.
Platforms
Windows Linux Virtual ApplianceKey Features
- Real-time vulnerability scanning
- Asset discovery and classification
- Risk-based prioritization
- and 3 more...
Use Cases
Enterprise vulnerability management Compliance auditing Risk assessment Continuous monitoringQualys VMDR
Cloud-based vulnerability management, detection, and response platform that provides continuous monitoring and remediation.
Platforms
Cloud-based Windows LinuxKey Features
- Continuous vulnerability assessment
- Asset inventory and tracking
- Threat detection and response
- and 3 more...
Use Cases
Cloud security monitoring Compliance management Threat hunting Risk assessmentAcunetix
Advanced web application security scanner that automatically tests web applications for security vulnerabilities.
Platforms
Windows Linux macOSKey Features
- Advanced web application scanning
- JavaScript and SPA support
- SQL injection detection
- and 3 more...
Use Cases
Web application security testing DevSecOps integration Compliance auditing API security testingAppScan
IBM's application security testing platform that helps identify and remediate security vulnerabilities in web and mobile applications.
Platforms
Windows Linux CloudKey Features
- Static and dynamic application testing
- Interactive application security testing
- Mobile application security testing
- and 3 more...
Use Cases
Enterprise application security DevSecOps integration Compliance testing Mobile app securityVeracode
Cloud-based application security platform that helps organizations secure their software throughout the development lifecycle.
Platforms
Cloud-based IDE integrationsKey Features
- Static application security testing (SAST)
- Dynamic application security testing (DAST)
- Software composition analysis (SCA)
- and 3 more...
Use Cases
Secure software development DevSecOps integration Compliance management Developer trainingCheckmarx
Application security testing platform that provides static code analysis and software composition analysis for secure development.
Platforms
Windows Linux CloudKey Features
- Static application security testing
- Software composition analysis
- Infrastructure as code scanning
- and 3 more...
Use Cases
Secure code development Open source risk management DevSecOps integration ComplianceSonarQube
Open source platform for continuous inspection of code quality and security that performs automatic reviews to detect bugs and vulnerabilities.
Platforms
Windows Linux macOS DockerKey Features
- Static code analysis
- Security vulnerability detection
- Code quality metrics
- and 3 more...
Use Cases
Code quality management Security vulnerability detection DevOps integration Technical debt managementOWASP Dependency-Check
Open source software composition analysis tool that identifies known vulnerabilities in project dependencies.
Platforms
Windows Linux macOSKey Features
- Dependency vulnerability scanning
- Multiple build system integration
- National Vulnerability Database integration
- and 3 more...
Use Cases
Open source dependency scanning Supply chain security DevSecOps integration ComplianceSnyk
Developer-first security platform that helps find and fix vulnerabilities in code, dependencies, containers, and infrastructure.
Platforms
Cloud-based IDE integrations CLIKey Features
- Vulnerability scanning for dependencies
- Container security scanning
- Infrastructure as code security
- and 3 more...
Use Cases
DevSecOps integration Open source security Container security Cloud securityGitGuardian
Code security platform that monitors source code for secrets, API keys, and other sensitive information to prevent data breaches.
Platforms
Cloud-based Git integrationsKey Features
- Secrets detection in code
- Real-time monitoring
- Git repository scanning
- and 3 more...
Use Cases
Secret management Code security monitoring DevSecOps integration ComplianceCrowdStrike Falcon
Cloud-native endpoint protection platform that combines next-generation antivirus, endpoint detection and response, and threat hunting.
Platforms
Windows Linux macOSKey Features
- Real-time threat detection
- Behavioral analysis
- Machine learning protection
- and 3 more...
Use Cases
Endpoint protection Threat hunting Incident response ComplianceSentinelOne
AI-powered autonomous endpoint protection platform that provides prevention, detection, response, and hunting across endpoints.
Platforms
Windows Linux macOSKey Features
- AI-powered threat detection
- Autonomous response
- Behavioral analysis
- and 3 more...
Use Cases
Endpoint protection Automated response Threat hunting ComplianceCarbon Black
VMware's endpoint security platform that provides next-generation antivirus, endpoint detection and response, and application control.
Platforms
Windows Linux macOSKey Features
- Behavioral monitoring
- Application control
- Endpoint detection and response
- and 3 more...
Use Cases
Endpoint protection Application control Incident response ComplianceCylance
AI-driven cybersecurity platform that uses machine learning to prevent, detect, and respond to advanced threats across endpoints.
Platforms
Windows Linux macOSKey Features
- AI-powered threat prevention
- Machine learning detection
- Memory protection
- and 3 more...
Use Cases
Endpoint protection Malware prevention Advanced threat detection Zero-day protectionESET Endpoint Security
Multi-layered endpoint security solution that combines proven antivirus technology with advanced threat detection capabilities.
Platforms
Windows Linux macOS MobileKey Features
- Multi-layered protection
- Machine learning detection
- Cloud-powered scanning
- and 3 more...
Use Cases
Endpoint protection Small business security Enterprise security Multi-platform protectionTrend Micro Apex One
Advanced endpoint security platform that combines automated threat detection and response with expert security analytics.
Platforms
Windows Linux macOSKey Features
- Advanced threat protection
- Behavioral analysis
- Machine learning detection
- and 3 more...
Use Cases
Enterprise endpoint protection Advanced threat detection Vulnerability protection ComplianceSymantec Endpoint Protection
Comprehensive endpoint security solution that uses artificial intelligence and machine learning to protect against known and unknown threats.
Platforms
Windows Linux macOSKey Features
- Advanced threat protection
- Machine learning detection
- Behavioral analysis
- and 3 more...
Use Cases
Enterprise endpoint protection Advanced threat detection Network security ComplianceMicrosoft Defender for Endpoint
Enterprise endpoint security platform that helps prevent, detect, investigate, and respond to advanced threats across endpoints.
Platforms
Windows Linux macOS iOS AndroidKey Features
- Next-generation protection
- Endpoint detection and response
- Automated investigation
- and 3 more...
Use Cases
Enterprise endpoint protection Microsoft ecosystem security Threat hunting ComplianceKaspersky Endpoint Security
Multi-layered endpoint protection that combines signature-based and behavior-based detection technologies for comprehensive security.
Platforms
Windows Linux macOSKey Features
- Advanced threat protection
- Behavioral analysis
- Application control
- and 3 more...
Use Cases
Endpoint protection Small business security Enterprise security Government securityMcAfee MVISION Endpoint
Cloud-native endpoint security platform that provides threat detection, investigation, and response capabilities with machine learning.
Platforms
Windows Linux macOSKey Features
- Machine learning protection
- Behavioral analysis
- Threat hunting
- and 3 more...
Use Cases
Cloud-based endpoint protection Threat hunting Automated response Enterprise securityBitdefender GravityZone
Layered endpoint protection platform that combines prevention, detection, and response technologies for comprehensive security.
Platforms
Windows Linux macOSKey Features
- Advanced threat defense
- Machine learning protection
- Behavioral analysis
- and 3 more...
Use Cases
Enterprise endpoint protection Advanced threat detection Multi-platform security CompliancePalo Alto Cortex XDR
Extended detection and response platform that integrates endpoint, network, and cloud data for comprehensive threat detection.
Platforms
Windows Linux macOS CloudKey Features
- Extended detection and response
- Machine learning analytics
- Behavioral threat protection
- and 3 more...
Use Cases
Extended threat detection Cloud security Advanced threat hunting Security operationsFortinet FortiEDR
Endpoint detection and response solution that provides real-time threat hunting, detection, and automated response capabilities.
Platforms
Windows Linux macOSKey Features
- Real-time threat detection
- Automated response
- Threat hunting
- and 3 more...
Use Cases
Endpoint detection and response Threat hunting Automated response ComplianceCisco Secure Endpoint
Cloud-delivered endpoint security solution that provides advanced malware protection and endpoint detection and response.
Platforms
Windows Linux macOS MobileKey Features
- Advanced malware protection
- Endpoint detection and response
- Threat hunting
- and 3 more...
Use Cases
Enterprise endpoint protection Advanced threat detection Security operations ComplianceSophos Intercept X
Next-generation endpoint protection that combines deep learning malware detection with exploit prevention and EDR capabilities.
Platforms
Windows Linux macOS MobileKey Features
- Deep learning malware detection
- Exploit prevention
- Ransomware protection
- and 3 more...
Use Cases
Endpoint protection Ransomware protection Mobile security Small business securityMalwarebytes Endpoint Protection
Anti-malware solution that provides comprehensive protection against advanced threats using behavioral analysis and machine learning.
Platforms
Windows macOS ChromeOSKey Features
- Anti-malware protection
- Behavioral analysis
- Exploit protection
- and 3 more...
Use Cases
Malware protection Small business security Endpoint protection Threat remediationF-Secure Elements
Endpoint protection platform that combines multiple security technologies to protect against advanced threats and targeted attacks.
Platforms
Windows Linux macOSKey Features
- Multi-layered protection
- Behavioral analysis
- Cloud-based security
- and 3 more...
Use Cases
Endpoint protection European market security Privacy-focused security Multi-platform protectionWebroot SecureAnywhere
Cloud-based endpoint security solution that uses behavioral analysis and machine learning to protect against malware and threats.
Platforms
Windows macOS MobileKey Features
- Cloud-based protection
- Behavioral analysis
- Real-time threat intelligence
- and 3 more...
Use Cases
Cloud-based endpoint protection Small business security Mobile security DNS protectionESET PROTECT Advanced
Multi-layered endpoint security platform that provides advanced threat detection, device control, and centralized management.
Platforms
Windows Linux macOS MobileKey Features
- Advanced threat detection
- Machine learning protection
- Device control
- and 3 more...
Use Cases
Enterprise endpoint protection Multi-platform security Device management Email securityComodo Advanced Endpoint Protection
Default-deny endpoint security platform that uses containment technology to prevent unknown threats from executing.
Platforms
Windows Linux macOSKey Features
- Default-deny protection
- Auto-containment technology
- Behavioral analysis
- and 3 more...
Use Cases
Zero-day protection Unknown threat prevention Compliance Managed security servicesZabbix
Enterprise-class open source distributed monitoring solution for networks and applications.
Platforms
Linux Windows macOS AIX FreeBSD SolarisKey Features
- Real-time monitoring
- Distributed monitoring
- Auto-discovery
- and 3 more...
Use Cases
Infrastructure monitoring Application monitoring Network monitoring Cloud monitoringNagios
Powerful monitoring system that enables organizations to identify and resolve IT infrastructure problems.
Platforms
Linux Unix WindowsKey Features
- Infrastructure monitoring
- Alerting and notifications
- Event handling
- and 3 more...
Use Cases
Server monitoring Network monitoring Application monitoring Service monitoringPRTG Network Monitor
All-in-one network monitoring solution for bandwidth, servers, websites, applications and more.
Platforms
WindowsKey Features
- Auto-discovery
- Real-time monitoring
- Customizable dashboards
- and 3 more...
Use Cases
Network monitoring Bandwidth monitoring Server monitoring Application monitoringDatadog
Cloud-scale monitoring and analytics platform for infrastructure, applications, and logs.
Platforms
Cloud-based Windows Linux macOSKey Features
- Infrastructure monitoring
- Application performance monitoring
- Log management
- and 3 more...
Use Cases
Cloud monitoring Application monitoring Log analysis Performance monitoringNew Relic
Observability platform built to help engineers create more perfect software.
Platforms
Cloud-based Multi-platform agentsKey Features
- Application performance monitoring
- Infrastructure monitoring
- Browser monitoring
- and 3 more...
Use Cases
Application monitoring Performance optimization Error tracking User experience monitoringSolarWinds NPM
Network performance monitoring software that provides real-time visibility into network performance.
Platforms
WindowsKey Features
- Network discovery and mapping
- Performance monitoring
- Alerting and reporting
- and 3 more...
Use Cases
Network monitoring Performance analysis Capacity planning TroubleshootingManageEngine OpManager
Network monitoring software that offers comprehensive fault and performance management.
Platforms
Windows LinuxKey Features
- Network discovery
- Performance monitoring
- Fault management
- and 3 more...
Use Cases
Network monitoring Performance management Configuration management Compliance reportingPrometheus
Open-source monitoring system with a dimensional data model and powerful query language.
Platforms
Linux Windows macOS Docker KubernetesKey Features
- Multi-dimensional data model
- PromQL query language
- Time series database
- and 3 more...
Use Cases
Cloud monitoring Microservices monitoring Container monitoring Infrastructure monitoringGrafana
Open source analytics and interactive visualization web application for monitoring metrics.
Platforms
Linux Windows macOS DockerKey Features
- Interactive visualizations
- Dashboard creation
- Multiple data source support
- and 3 more...
Use Cases
Data visualization Monitoring dashboards Analytics ReportingInfluxDB
Time series database designed to handle high write and query loads for monitoring and analytics.
Platforms
Linux Windows macOS DockerKey Features
- Time series database
- SQL-like query language
- High performance
- and 3 more...
Use Cases
Time series data storage IoT data Monitoring metrics Real-time analyticsElastic Stack (ELK)
Distributed search and analytics engine with data collection and visualization capabilities.
Platforms
Linux Windows macOS DockerKey Features
- Full-text search
- Real-time analytics
- Data visualization
- and 3 more...
Use Cases
Log analysis Security monitoring Business analytics Application monitoringLogstash
Server-side data processing pipeline that ingests data from multiple sources and transforms it.
Platforms
Linux Windows macOS DockerKey Features
- Data collection
- Data transformation
- Output plugins
- and 3 more...
Use Cases
Log processing Data transformation ETL operations Data enrichmentKibana
Data visualization dashboard for Elasticsearch with search and data exploration capabilities.
Platforms
Linux Windows macOS DockerKey Features
- Interactive visualizations
- Dashboard creation
- Data exploration
- and 3 more...
Use Cases
Data visualization Log analysis Monitoring dashboards Business intelligenceWazuh
Open source security platform that unifies XDR and SIEM capabilities for threat detection.
Platforms
Linux Windows macOS Solaris AIXKey Features
- Host-based intrusion detection
- Log analysis
- File integrity monitoring
- and 3 more...
Use Cases
Threat detection Compliance monitoring Log analysis Incident responseOSSEC
Host-based intrusion detection system that performs log analysis and integrity checking.
Platforms
Linux Windows macOS Solaris FreeBSDKey Features
- Log analysis
- File integrity monitoring
- Rootkit detection
- and 3 more...
Use Cases
Intrusion detection Log monitoring File integrity monitoring ComplianceTheHive
Scalable security incident response platform designed to make life easier for SOCs and CERTs.
Platforms
Linux DockerKey Features
- Case management
- Task management
- Observable analysis
- and 3 more...
Use Cases
Incident response Case management Threat hunting SOC operationsCortex
Observable analysis and active response engine that works with TheHive for automated threat analysis.
Platforms
Linux DockerKey Features
- Observable analysis
- Analyzer management
- Report generation
- and 3 more...
Use Cases
Threat analysis Observable enrichment Automated response Threat intelligenceMISP
Threat intelligence sharing platform for storing, sharing, and correlating Indicators of Compromise.
Platforms
Linux DockerKey Features
- Threat intelligence sharing
- IOC management
- Event correlation
- and 3 more...
Use Cases
Threat intelligence IOC sharing Malware analysis Attribution trackingPhantom (Splunk SOAR)
Security orchestration, automation and response platform for streamlining security operations.
Platforms
Linux CloudKey Features
- Security orchestration
- Automated response
- Playbook execution
- and 3 more...
Use Cases
Security automation Incident response Threat hunting SOC efficiencyDocker Security
Container security platform providing vulnerability scanning and runtime protection for Docker containers.
Platforms
Linux Windows macOS CloudKey Features
- Container vulnerability scanning
- Image security analysis
- Runtime protection
- and 3 more...
Use Cases
Container security DevSecOps Compliance Vulnerability managementTwistlock (Prisma Cloud)
Comprehensive cloud native security platform for containers, serverless, and cloud infrastructure.
Platforms
Linux Windows Cloud KubernetesKey Features
- Container vulnerability scanning
- Runtime protection
- Compliance monitoring
- and 3 more...
Use Cases
Container security Cloud security DevSecOps ComplianceAqua Security
Full lifecycle security for cloud native applications from development to production.
Platforms
Linux Windows Cloud KubernetesKey Features
- Image scanning
- Runtime protection
- Network security
- and 3 more...
Use Cases
Container security DevSecOps Cloud security ComplianceAnchore
Container security and compliance platform for container image analysis and policy enforcement.
Platforms
Linux Docker KubernetesKey Features
- Deep image inspection
- Vulnerability scanning
- Policy enforcement
- and 3 more...
Use Cases
Container security DevSecOps Compliance Image analysisFalco
Runtime security monitoring for cloud native applications and Kubernetes.
Platforms
Linux KubernetesKey Features
- Runtime threat detection
- Anomaly detection
- Compliance monitoring
- and 3 more...
Use Cases
Runtime security Threat detection Compliance monitoring Anomaly detectionPostman
API development and testing platform with security testing capabilities for API endpoints.
Platforms
Windows macOS Linux WebKey Features
- API testing
- Security testing
- Automated testing
- and 3 more...
Use Cases
API testing Security testing Documentation Team collaborationOWASP ZAP
Open source web application security scanner designed for finding vulnerabilities in web applications.
Platforms
Windows Linux macOSKey Features
- Automated vulnerability scanning
- Manual security testing
- API testing
- and 3 more...
Use Cases
API security testing Web application testing Security automation Penetration testingInsomnia
API client and design platform with security testing capabilities for REST and GraphQL APIs.
Platforms
Windows macOS LinuxKey Features
- API client
- Request testing
- Environment management
- and 3 more...
Use Cases
API testing Security testing Development Documentation42Crunch
API security platform providing protection throughout the API lifecycle from design to runtime.
Platforms
Cloud On-premisesKey Features
- API security audit
- Runtime protection
- API firewall
- and 3 more...
Use Cases
API security Runtime protection Compliance Security testingSalt Security
API protection platform that uses AI to discover, protect, and remediate API vulnerabilities.
Platforms
Cloud On-premisesKey Features
- API discovery
- Threat detection
- Behavioral analysis
- and 3 more...
Use Cases
API security Threat detection Compliance API discoveryGitLab Security
Integrated DevSecOps platform with security scanning, dependency checking, and compliance features.
Platforms
Cloud On-premisesKey Features
- SAST scanning
- DAST scanning
- Dependency scanning
- and 3 more...
Use Cases
DevSecOps Security scanning Compliance Vulnerability managementGitHub Advanced Security
Integrated security features for GitHub repositories including code scanning and secret detection.
Platforms
Cloud GitHub EnterpriseKey Features
- Code scanning
- Secret scanning
- Dependency review
- and 3 more...
Use Cases
DevSecOps Code security Secret management Vulnerability managementJenkins Security
Security plugins and features for Jenkins CI/CD pipeline security and DevSecOps integration.
Platforms
Linux Windows macOSKey Features
- Security plugins
- Access control
- Audit logging
- and 3 more...
Use Cases
CI/CD security DevSecOps Access control Security automationTerraform Security
Infrastructure as Code security tools for scanning and securing Terraform configurations.
Platforms
Multi-platformKey Features
- Configuration scanning
- Policy as code
- Compliance checking
- and 3 more...
Use Cases
Infrastructure security Compliance DevSecOps Cloud securityMobSF
Mobile Security Framework for automated security testing of mobile applications (Android/iOS).
Platforms
Linux Windows macOS DockerKey Features
- Static analysis
- Dynamic analysis
- Malware analysis
- and 3 more...
Use Cases
Mobile app security Penetration testing Malware analysis Compliance testingQARK
Quick Android Review Kit for finding common security vulnerabilities in Android applications.
Platforms
Linux Windows macOSKey Features
- Static analysis
- Security vulnerability detection
- Report generation
- and 3 more...
Use Cases
Android security testing Code review Vulnerability assessment DevSecOpsNessus Professional
Comprehensive vulnerability scanner for identifying security weaknesses across networks and applications.
Platforms
Linux Windows macOSKey Features
- Vulnerability scanning
- Configuration auditing
- Malware detection
- and 3 more...
Use Cases
Vulnerability assessment Compliance auditing Risk management Security monitoringRapid7 InsightVM
Vulnerability management platform that provides real-time vulnerability management and risk prioritization.
Platforms
Cloud On-premisesKey Features
- Live vulnerability dashboard
- Risk-based prioritization
- Remediation workflow
- and 3 more...
Use Cases
Vulnerability management Risk assessment Compliance Security operationsQualys VMDR
Cloud-based vulnerability management, detection and response platform for comprehensive security.
Platforms
Cloud Virtual applianceKey Features
- Vulnerability assessment
- Threat detection
- Asset discovery
- and 3 more...
Use Cases
Vulnerability management Threat detection Compliance Asset managementGreenbone OpenVAS
Open source vulnerability assessment and management solution for comprehensive security testing.
Platforms
LinuxKey Features
- Vulnerability scanning
- Network discovery
- Compliance checking
- and 3 more...
Use Cases
Vulnerability assessment Network security Compliance Risk managementAWS Security Hub
Cloud security posture management service that provides centralized security findings from AWS security services.
Platforms
AWS CloudKey Features
- Centralized security findings
- Compliance monitoring
- Automated remediation
- and 3 more...
Use Cases
Cloud security Compliance monitoring Security operations Multi-account governanceAzure Security Center
Cloud security posture management and threat protection for Azure and hybrid cloud workloads.
Platforms
Azure Cloud HybridKey Features
- Security posture assessment
- Threat protection
- Compliance monitoring
- and 3 more...
Use Cases
Cloud security Threat protection Compliance Security monitoringGoogle Cloud Security
Comprehensive cloud security platform for Google Cloud Platform with threat detection and compliance.
Platforms
Google Cloud PlatformKey Features
- Security command center
- Cloud asset inventory
- Binary authorization
- and 3 more...
Use Cases
Cloud security Compliance Data protection Identity managementCloudTrail
AWS service that enables governance, compliance, and risk auditing of AWS account activity.
Platforms
AWS CloudKey Features
- API logging
- Event history
- Compliance auditing
- and 3 more...
Use Cases
Audit logging Compliance Security monitoring Forensic analysisCloudWatch
AWS monitoring and observability service for cloud resources and applications with security monitoring capabilities.
Platforms
AWS CloudKey Features
- Metrics monitoring
- Log monitoring
- Alerting
- and 3 more...
Use Cases
Infrastructure monitoring Security monitoring Performance monitoring AlertingSumo Logic
Cloud-native SaaS analytics platform for machine data with security analytics and monitoring.
Platforms
Cloud-basedKey Features
- Log aggregation
- Real-time analytics
- Security monitoring
- and 3 more...
Use Cases
Security monitoring Log analysis Compliance DevSecOpsLogRhythm
Security information and event management platform with advanced threat detection and response.
Platforms
On-premises CloudKey Features
- SIEM capabilities
- User behavior analytics
- Threat intelligence
- and 3 more...
Use Cases
Security monitoring Threat detection Incident response ComplianceIBM QRadar
Enterprise SIEM platform that provides intelligent security analytics and real-time threat detection.
Platforms
On-premises CloudKey Features
- Security intelligence
- Log management
- Network flow analysis
- and 3 more...
Use Cases
Enterprise SIEM Threat detection Compliance Risk managementAlienVault OSSIM
Open source security information and event management platform for threat detection and compliance.
Platforms
LinuxKey Features
- Event correlation
- Asset discovery
- Vulnerability assessment
- and 3 more...
Use Cases
SIEM operations Threat detection Compliance Network monitoringCrowdStrike Falcon
Cloud-native endpoint protection platform with AI-powered threat detection and response.
Platforms
Windows macOS LinuxKey Features
- Next-gen antivirus
- Endpoint detection and response
- Threat intelligence
- and 3 more...
Use Cases
Endpoint protection Threat hunting Incident response Advanced threat detectionCarbon Black
Endpoint security platform providing next-generation antivirus and endpoint detection and response.
Platforms
Windows macOS LinuxKey Features
- Behavioral analysis
- Threat hunting
- Incident response
- and 3 more...
Use Cases
Endpoint protection Threat detection Incident response Application controlSentinelOne
AI-powered endpoint protection platform with autonomous threat hunting and response capabilities.
Platforms
Windows macOS LinuxKey Features
- AI-powered detection
- Autonomous response
- Threat hunting
- and 3 more...
Use Cases
Endpoint protection Autonomous response Threat hunting Malware detectionCylance
AI-driven endpoint security platform that prevents malware and advanced threats using machine learning.
Platforms
Windows macOS LinuxKey Features
- AI-driven protection
- Pre-execution detection
- Machine learning
- and 3 more...
Use Cases
Malware prevention Advanced threat protection Endpoint security Zero-day protectionTrend Micro
Comprehensive cybersecurity platform providing endpoint, network, and cloud security solutions.
Platforms
Windows macOS Linux MobileKey Features
- Multi-layered protection
- Web reputation
- Behavioral analysis
- and 3 more...
Use Cases
Endpoint protection Network security Cloud security Email securityKaspersky
Enterprise cybersecurity platform with advanced threat detection and endpoint protection capabilities.
Platforms
Windows macOS Linux MobileKey Features
- Advanced threat detection
- Behavioral analysis
- Application control
- and 3 more...
Use Cases
Endpoint protection Advanced threat detection Security management ComplianceMicrosoft Defender
Enterprise endpoint protection platform integrated with Microsoft ecosystem for comprehensive security.
Platforms
Windows macOS Linux iOS AndroidKey Features
- Next-generation protection
- Endpoint detection and response
- Threat hunting
- and 3 more...
Use Cases
Endpoint protection Threat hunting Security operations Microsoft ecosystem securityESET
Multi-layered endpoint security solution with advanced threat detection and minimal system impact.
Platforms
Windows macOS LinuxKey Features
- Multi-layered detection
- Machine learning
- Cloud-powered scanning
- and 3 more...
Use Cases
Endpoint protection Malware detection Network protection Enterprise securitySymantec Endpoint Protection
Enterprise endpoint security platform with advanced threat protection and management capabilities.
Platforms
Windows macOS LinuxKey Features
- Advanced threat protection
- Behavioral analysis
- Application and device control
- and 3 more...
Use Cases
Enterprise endpoint protection Advanced threat detection Security management ComplianceMcAfee
Comprehensive cybersecurity platform providing endpoint, network, and cloud security solutions.
Platforms
Windows macOS Linux MobileKey Features
- Multi-vector protection
- Machine learning detection
- Behavioral analysis
- and 3 more...
Use Cases
Endpoint protection Network security Data protection Email securityBitdefender
Advanced threat defense platform with machine learning and behavioral analysis for enterprise security.
Platforms
Windows macOS LinuxKey Features
- Advanced threat defense
- Machine learning protection
- Web threat protection
- and 3 more...
Use Cases
Endpoint protection Advanced threat defense Web security Content filteringF-Secure
Endpoint protection platform focused on advanced threat detection with minimal performance impact.
Platforms
Windows macOS LinuxKey Features
- Behavioral analysis
- DeepGuard technology
- Exploit protection
- and 3 more...