Popular Cybersecurity Tools
The highest-rated security solutions chosen by enterprise security teams and professionals.
Browse 131 popular cybersecurity tools tools
POPULAR
Automated vulnerability assessment and remediation platform
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
AI security assurance platform for red-teaming, guardrails & compliance
Weekly cybersecurity newsletter covering security incidents, AI, and leadership
Weekly cybersecurity newsletter covering security incidents, AI, and leadership
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Cybercrime intelligence tools for searching compromised credentials from infostealers
Bash script for blocking domain access on Linux via iptables/ip6tables rules
Bash script for blocking domain access on Linux via iptables/ip6tables rules
A newsletter service that tracks and reports weekly changes in detection engineering rules and updates across multiple GitHub repositories.
A newsletter service that tracks and reports weekly changes in detection engineering rules and updates across multiple GitHub repositories.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
AI agent that autonomously discovers, exploits, and documents vulnerabilities.
AI agent that autonomously discovers, exploits, and documents vulnerabilities.
MCP server enabling AI agents to autonomously run 150+ security tools
MCP server enabling AI agents to autonomously run 150+ security tools
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
Blog providing cybersecurity, AI security, and leadership insights for CISOs
Blog providing cybersecurity, AI security, and leadership insights for CISOs
Free cyber security training and resources for career development.
SecTemplates provides free security program templates, runbooks, and documentation resources for information security professionals and engineering teams.
SecTemplates provides free security program templates, runbooks, and documentation resources for information security professionals and engineering teams.
SAST tool that detects logical flaws and business logic vulnerabilities
SAST tool that detects logical flaws and business logic vulnerabilities
Wazuh is an open-source security platform offering unified XDR and SIEM protection for endpoints and cloud workloads, integrating various security functions into a single architecture.
Wazuh is an open-source security platform offering unified XDR and SIEM protection for endpoints and cloud workloads, integrating various security functions into a single architecture.