Home / Threat Defense

Threat Defense

Comprehensive threat management, vulnerability assessment, and attack surface monitoring tools

incident handling and digital forensics

CERT-In
Free

CERT-In View CERT-In

CERT-In is India's premier national computer security incident response team, operating under the Ministry of Electronics & Information Technology. Its core mission is to safeguard India's cyberspace through proactive incident prevention, swift and effective response services, and comprehensive security quality management. CERT-In plays a vital role in enhancing national cybersecurity posture and mitigating digital threats.

National Computer Security Incident Response
Cyber Threat Prevention Services
Incident Response and Mitigation
Ethio-CERT
Free

Ethio-CERT View Ethio-CERT

Ethio-CERT, the National Cyber Emergency Readiness and Response Team of Ethiopia, is dedicated to safeguarding the nation's cyberspace. By conducting comprehensive proactive and reactive (Incident Response) activities, Ethio-CERT defends against both accidental and deliberate cyber-attacks, ensuring national digital resilience. This pivotal organization operates at the forefront of cybersecurity defense for Ethiopia.

National Cyber Defense
Incident Response
Proactive Threat Detection
Casco
Free

Casco View Casco

Casco provides robust security for AI agents and applications by proactively simulating sophisticated attacks. Our platform rigorously tests your AI systems to uncover vulnerabilities, offering actionable insights and guided remediation to strengthen your defenses against evolving AI-specific threats. Ensure your AI deployments are secure and resilient, mitigating costly breaches and maintaining operational integrity.

Proactive AI attack simulation
Automated vulnerability detection
Guided remediation workflows
C3.ai Digital Transformation Institute
Free

C3.ai Digital Transformation Institute View C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute (DTI) is a premier research consortium pioneering the advancement and adoption of artificial intelligence across business, government, and societal sectors. By convening top global scientists, DTI drives innovation in the Science of Digital Transformation, an interdisciplinary field encompassing AI, machine learning, cloud computing, IoT, big data analytics, organizational behavior, public policy, and ethics. Through its competitive grant program, managed by UC Berkeley and UIUC, DTI supports groundbreaking research and practitioner training to accelerate the real-world impact of digital transformation.

World-class scientific research consortium
Focus on the Science of Digital Transformation
Interdisciplinary research areas (AI, ML, IoT, Big Data, Ethics, etc.)
Appurity
Free

Appurity View Appurity

Appurity delivers comprehensive mobile and application security solutions designed to protect your business-critical data. Recognizing that mobile devices and applications are primary attack vectors, Appurity offers end-to-end security strategies, safeguarding information whether it's at rest, in transit, or across your endpoint, cloud, and on-premise environments. As an Android Enterprise Service Provider and Apple Consultants Network member, we craft bespoke solutions tailored to your specific industry needs, ensuring robust protection without compromising employee accessibility.

End-to-end mobile and application security
Data protection at rest, in transit, and at the endpoint
Cloud and on-premise security solutions
Cerby
Free

Cerby View Cerby

Cerby revolutionizes application security by transforming it into an employee productivity enhancer. We empower teams to deploy, access, and share technology securely, mitigating risks associated with unmanaged applications. By automating the protection of your brand against common security misconfigurations like shared passwords and disabled 2FA, Cerby proactively defends your business and data from sophisticated threats, ensuring seamless security so your team can focus on innovation.

Automated brand protection against application misconfigurations
Enhanced employee productivity through streamlined secure access
Proactive defense against shared password risks
Feroot Security
Free

Feroot Security View Feroot Security

Feroot Security empowers organizations to proactively secure their client-side web applications and safeguard the digital user experience. Our comprehensive solutions automate the discovery, analysis, and real-time protection of JavaScript assets, mitigating the risks associated with client-side cyber threats. By simplifying data protection and threat management, Feroot enables businesses to deliver secure, uncompromised online interactions for every customer.

Automated client-side asset discovery and inventory
Real-time protection against client-side cyber attacks
Comprehensive JavaScript security analysis
BeVigil Enterprise
Free

BeVigil Enterprise

A threat intelligence platform that provides comprehensive visibility into an organization's attack surface by collecting, analyzing, and structuring threat data to enable proactive security measures against emerging threats.

DeTCT
Free

DeTCT

Panorays is a third-party cyber risk management platform that combines external attack surface monitoring with automated security questionnaires to assess, remediate, and continuously monitor vendor security postures.

Quantstamp
Free

Quantstamp View Quantstamp

Quantstamp is the premier blockchain security firm dedicated to safeguarding digital assets for the Web3 ecosystem. Leveraging extensive expertise and rigorous auditing methodologies, we have protected billions in value and established ourselves as a trusted partner for leading projects like Aave, Compound, and Polygon. Beyond our core security services, Quantstamp actively fosters Web3 growth through strategic investments and advisory roles, ensuring the long-term security and scalability of innovative decentralized applications.

Comprehensive Blockchain Audits
Smart Contract Security Analysis
Web3 Security Consulting
CYRIN
Free

CYRIN View CYRIN

CYRINĀ® is a cutting-edge, cloud-based cyber range that redefines cybersecurity training. It offers an immersive virtual environment where professionals can practice with authentic tools and tackle realistic attack scenarios. CYRIN ensures continuous skill development and readiness with unparalleled depth of training content, accessible anytime, anywhere, without the need for specialized software.

Next-generation cloud-based cyber range
Realistic training with real tools and scenarios
Immersive virtual environment for each user
Cyber Range Malaysia
Free

Cyber Range Malaysia View Cyber Range Malaysia

Cyber Range Malaysia offers a cutting-edge platform designed to elevate cybersecurity training and preparedness. Leveraging advanced simulation technologies, we empower organizations and individuals to hone their defensive and offensive cybersecurity skills in a realistic, controlled environment. Our comprehensive programs are built to bridge the gap between theoretical knowledge and practical application, ensuring a highly skilled and resilient cybersecurity workforce.

Realistic Cyber Attack and Defense Simulations
Hands-on Training for Security Professionals
Customizable Training Scenarios
PurpleSynapz
Free

PurpleSynapz View PurpleSynapz

PurpleSynapz offers hyper-realistic cybersecurity training through a state-of-the-art Cyber Range, addressing the critical talent shortage in the industry. Our curriculum, powered by QOS Technology, simulates real-world network environments and attack scenarios. This allows individuals and organizations to gain hands-on experience with industry-standard tools and tactics, honing essential skills to effectively defend against modern cyber threats in a safe, practical lab setting.

Hyper-realistic Cyber Range with QOS Technology
Modern, practical cybersecurity curriculum
Simulated cyberwarfare and real-life attack scenarios
US Cyber Range
Free

US Cyber Range View US Cyber Range

US Cyber Range offers a dynamic, cloud-based platform designed for advanced cybersecurity training. It provides hyper-realistic virtual environments, simulating real-world networks, tools, and threats to cultivate essential cyber practitioner skills. This scalable solution empowers security teams and individuals to hone their abilities through customizable labs and military-grade simulations, ensuring preparedness against sophisticated cyberattacks.

Scalable, cloud-hosted infrastructure
Hyper-realistic virtual training environments
Military-grade cybersecurity simulation
Cyber Ranges
Free

Cyber Ranges View Cyber Ranges

Cyber Ranges redefines cyber readiness by offering a next-generation platform for developing advanced cyber capabilities and rigorously validating security skills and organizational resilience. Leveraging cloud-native technology, it orchestrates the entire lifecycle of realistic, simulation-based cyber security training experiences. This approach ensures unparalleled depth and scalability, surpassing traditional virtualization limitations and empowering organizations to meet the most demanding cyber defense scenarios.

Next-generation cloud-native cyber range platform
Comprehensive lifecycle management of realistic cyber scenarios
World-class cyber security training and capability development
CERT.hr
Free

CERT.hr View CERT.hr

CERT.hr serves as the national authority responsible for the prevention, detection, and response to cyber threats impacting the public information systems of the Republic of Croatia. Collaborating strategically with domestic entities like the Information Systems Security Bureau (ZSIS CERT) and international bodies through organizations such as FIRST, CERT.hr actively mitigates cyber risks and enhances national digital security posture.

National authority for cyber threat prevention and protection
Focus on public information systems in Croatia
Cooperation with national security and interior ministries
National Cyber Security Centre (NKSC) - Lithuania
Free

National Cyber Security Centre (NKSC) - Lithuania View National Cyber Security Centre (NKSC) - Lithuania

The National Cyber Security Centre (NKSC) of Lithuania is the principal governmental authority dedicated to fortifying the nation's cyberspace. It spearheads unified cyber incident management, enforces security requirements, and serves as the central hub for cyber security expertise. Committed to a robust national cyber defense, the NKSC actively implements cyber security policy, conducts vital research, and provides essential assistance to state institutions, businesses, and citizens to foster a resilient digital environment.

Unified Cyber Incident Management
Cyber Security Requirements Monitoring and Control
National Cyber Security Policy Implementation
National Cyber Security Directorate (DNSC) - Romania
Free

National Cyber Security Directorate (DNSC) - Romania View National Cyber Security Directorate (DNSC) - Romania

The National Cyber Security Directorate (DNSC) of Romania, formerly CERT-RO, is the national authority dedicated to safeguarding Romania's civil cyberspace. As a specialized government body, DNSC is mandated to prevent, analyze, detect, and respond to cyber incidents, ensuring the resilience of national cyber infrastructure through the development and dissemination of comprehensive public policies. Their expertise encompasses proactive threat mitigation and reactive incident management, contributing to a secure digital environment for the nation.

National cyber security incident response
Development of national cyber security policies
Cyber incident prevention and analysis
Cybersecurity Tech Accord
Free

Cybersecurity Tech Accord View Cybersecurity Tech Accord

The Cybersecurity Tech Accord unites leading global technology companies in a shared commitment to a safer and more secure digital future. By fostering unprecedented collaboration and sharing best practices, the Accord's signatories actively work to protect customers and users from evolving cyber threats. This alliance drives impactful initiatives that enhance the stability and resilience of cyberspace, leveraging collective industry expertise for proactive defense and decisive action against malicious actors.

Global technology company collaboration
Commitment to customer and user protection
Advancing cybersecurity initiatives
Kernelios
Free

Kernelios View Kernelios

Kernelios is a premier simulator-based training center and incubator dedicated to cultivating the next generation of global cybersecurity experts. Our state-of-the-art Cyber Command Knowledge Center delivers a uniquely professional and innovative curriculum designed to equip aspiring professionals with comprehensive cybersecurity knowledge and practical skills. We empower students to become invaluable knowledge centers within their own organizations, fostering a new standard in cyber defense.

Advanced simulator-based cybersecurity training
World-first dedicated Cyber Command Knowledge Center
Comprehensive curriculum for aspiring experts
GlobalPass
Free

GlobalPass View GlobalPass

GlobalPass delivers comprehensive data protection and application security solutions designed to meet the diverse needs of businesses, from startups to enterprises. By integrating robust PDF Digital Rights Management (DRM) with expert legal advisory and proactive cybersecurity measures, GlobalPass empowers organizations to safeguard sensitive information, prevent unauthorized access and piracy, and mitigate cyber risks effectively.

Tailored solutions for businesses of all sizes
Robust PDF DRM for document protection
Prevention of unauthorized access, misuse, and leakage
Disklabs
Free

Disklabs View Disklabs

Disklabs is a premier provider of data recovery, digital forensics, and data erasure services since 1997. Leveraging state-of-the-art laboratories and specialized facilities, we offer expert solutions for criminal justice, national security, and corporate needs. Our services, including advanced data recovery, forensic investigations, and secure data erasure, are trusted by law enforcement, government agencies, and the general public.

Industry-leading data recovery services
Specialized digital forensics laboratories
Secure and accredited data erasure solutions
CyberSentriq
Free

CyberSentriq View CyberSentriq

CyberSentriq is a comprehensive cybersecurity and data protection platform specifically designed for Managed Service Providers (MSPs). By integrating best-of-breed solutions, it delivers advanced, AI-driven email and web security, robust data protection, and ensures operational resilience for over 150,000 SMBs worldwide. This unified platform empowers MSPs to proactively defend against evolving cyber threats and safeguard their clients' critical assets.

AI-driven email and web security
Advanced data protection and backup
Proactive threat detection and prevention
BlackFog
Free

BlackFog View BlackFog

BlackFog delivers advanced device data privacy, robust data security, and proactive ransomware prevention through its pioneering on-device anti-data exfiltration (ADX) technology. By employing sophisticated behavioral analysis, BlackFog preemptively neutralizes cyber threats like ransomware, spyware, malware, and unauthorized data collection before they can impact your organization, ensuring enterprise compliance with global privacy regulations across all endpoints.

On-device Anti-Data Exfiltration (ADX) Technology
Behavioral Analysis for Threat Detection
Ransomware Prevention
AMT Honeypot
Free

AMT Honeypot

A low to medium interaction honeypot with a variety of plugins for cybersecurity monitoring.

Arctic Swallow
Free

Arctic Swallow

Hived is a honeypot tool for deceiving attackers and gathering information.

BW-Pot
Free

BW-Pot

A webapp for displaying statistics about your kippo SSH honeypot.

National Cyber Security Center (NCSC) - Hungary
Free

National Cyber Security Center (NCSC) - Hungary View National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center (NCSC) of Hungary, established in 2015, consolidates the expertise of GovCERT-Hungary, NEISA, and the Cyber Defence Management Authority. This unified entity enhances coordination and efficiency in managing Hungary's national cybersecurity landscape. The NCSC actively supports the entire information security lifecycle, from strategic planning and regulation to proactive vulnerability assessment and responsive incident handling, ensuring the robust protection of national electronic information systems.

Integrated national cybersecurity coordination
Government Computer Emergency Response Team (GovCERT) operations
National Electronic Information Security Authority (NEISA) functions
FIRST Conference
Free

FIRST Conference View FIRST Conference

The FIRST Conference is the premier annual gathering for incident response and security professionals worldwide, organized by the Forum of Incident Response and Security Teams (FIRST). This intensive 4-5 day event fosters knowledge exchange and collaboration among global experts, covering the latest trends in incident response, vulnerability analysis, and cybersecurity management. Attendees gain invaluable insights from diverse international speakers, including keynotes from outside the FIRST community, addressing critical international security challenges and best practices.

Annual global event for incident response and security teams
Expert-led sessions on incident response and prevention
Vulnerability analysis and computer security best practices
CyberUSA
Free

CyberUSA View CyberUSA

CyberUSA is a vital non-profit organization uniting leaders and states to accelerate innovation, education, workforce development, and cyber readiness across the United States and its Allied partners. By fostering a robust 'community of communities,' CyberUSA enhances information sharing and improves cyber resilience at local, regional, and national levels through a dedicated communication framework, impactful national summits, and curated resources. We actively invite technology councils, chambers of commerce, cyber groups, ISAOs, ISACs, and other trusted membership organizations to join our collaborative ecosystem and strengthen collective cybersecurity posture.

National Cyber Readiness and Resilience Initiatives
Information Sharing Framework
Workforce Development and Education Programs
HCL Technologies
Free
Integrated portfolio of Digital, IoT, Cloud, and Automation solutions
Next-generation Cybersecurity services with a 'Dynamic Cybersecurity Framework'
Expertise in Analytics and Infrastructure Management

National Cyber Security Strategy

Information & eGovernment Authority (iGA) - Bahrain
Free

Information & eGovernment Authority (iGA) - Bahrain View Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority (iGA) of Bahrain is a pivotal government entity dedicated to advancing the nation's IT sector and ensuring robust information security and efficient radiocommunication management. Through its specialized directorates within the Information Security and Radiocommunications sector, iGA provides comprehensive protection for government networks, upholds data confidentiality, and champions a secure digital environment free from interference and cyber threats.

Government network security and protection
Information confidentiality and data security
Radio spectrum management
Andrisoft
Free

Andrisoft View Andrisoft

Andrisoft delivers WANGUARD, a robust anti-DDoS software solution engineered to safeguard networks against sophisticated Distributed Denial of Service attacks. Leveraging advanced packet-based and flow-based sensors, WANGUARD actively monitors IP traffic, filtering malicious packets and employing BGP black-holing to neutralize threats. Since its inception in 2006, Andrisoft has specialized in providing comprehensive solutions for Network Operation Centers, focusing on traffic monitoring, accounting, DDoS protection, and robust policy enforcement for IP networks.

Comprehensive anti-DDoS software solution
Packet-based and flow-based traffic monitoring
Real-time malicious packet filtering
Defence Labs
Free

Defence Labs View Defence Labs

Defence Labs, established in 2024 and headquartered in Burlington, Ontario, specializes in advanced application and network penetration testing. We deliver comprehensive cybersecurity solutions, including incident response and risk management, at competitive rates to safeguard your business. Our experienced professionals provide personalized strategies to proactively identify and remediate vulnerabilities, staying ahead of emerging threats to ensure your digital assets remain secure.

Application Penetration Testing
Network Penetration Testing
Incident Response Services
Insta Group
Free

Insta Group View Insta Group

Insta Group is a trusted cybersecurity partner dedicated to safeguarding security-critical organizations. Leveraging 30 years of expertise and Finnish engineering, we provide comprehensive solutions to identify vulnerabilities, protect critical assets, and enhance detection and response capabilities. Our specialized services include PKI, data encryption, SIEM, SOC, and penetration testing, all designed to bolster your digital resilience in an evolving threat landscape.

Expert PKI and Data Encryption Services
End-to-End SIEM and SOC Solutions
Advanced Penetration Testing and Vulnerability Assessment
Rebellion Defense
Free

Rebellion Defense View Rebellion Defense

Rebellion Defense is a leading technology company empowering mission-critical organizations with advanced software solutions to proactively defend against evolving cyber threats. By integrating world-class commercial software engineering talent with deep defense and national security expertise, Rebellion Defense delivers unparalleled capabilities for cyber readiness and software security.

Automated adversary emulation for comprehensive defense testing
Realistic threat simulation leveraging APT techniques
Discovery of mission exposure to global cyber threats
AFCERT
Free

AFCERT View AFCERT

AFCERT serves as Afghanistan's national Computer Emergency Response Team, acting as the primary first responder to cyber and computer security incidents within the country. Operating under the Ministry of Communications and Information Technology (MCIT), AFCERT collaborates closely with national law enforcement agencies and provides critical cybersecurity awareness to both governmental and private sector entities. Our 24/7 Security Operations Center (SOC) ensures continuous monitoring and timely updates through global CERT cooperation, bolstering national cyber resilience.

National Cyber Incident First Response
24/7 Security Operations Center (SOC)
Collaboration with Law Enforcement
Altron
Free

Altron View Altron

Altron delivers innovative and integrated ICT solutions tailored to the unique needs of businesses, government entities, and consumers. Leveraging deep technical expertise alongside an in-depth understanding of client challenges, Altron offers comprehensive, end-to-end technology solutions designed to optimize operations and enhance security.

End-to-end ICT solution integration
Cyber Security expertise
Dedicated Security Operations Centre (SOC)
Axence
Free

Axence View Axence

Axence delivers comprehensive IT infrastructure management solutions designed for businesses and institutions globally. Our core product, Axence nVisionĀ®, empowers IT administrators and security officers with advanced capabilities for network and user monitoring, hardware/software inventory, remote support, and data loss prevention. Optimize operational costs and enhance security across any IT environment, regardless of scale.

Comprehensive IT infrastructure management
Network and user monitoring
Hardware and software inventory management

Smart Contract Auditing & Security

GoPlus Security
Free

GoPlus Security View GoPlus Security

GoPlus Security is the foundational security infrastructure for the Web3 ecosystem, offering open, permissionless, and user-driven security services across multiple chains. Its comprehensive engine provides multidimensional risk detection for both crypto projects and individual users, fostering a safer and more secure blockchain environment. GoPlus offers a dynamic and automated platform encompassing token, NFT, malicious address, approval, and dApp contract security, alongside customizable solutions.

Multi-chain Security Infrastructure
Token and NFT Risk Detection
Malicious Address Identification
2024 Data Breach Investigations Report
Free

2024 Data Breach Investigations Report

Cortex is a tool for analyzing observables at scale and automating threat intelligence, digital forensics, and incident response.

APT & Cybercriminals Campaign Collection
Free

APT & Cybercriminals Campaign Collection

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

APT Groups and Operations
Free

APT Groups and Operations

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

0day.today Exploit Database
Free

0day.today Exploit Database

A tool for detecting and exploiting vulnerabilities in web applications

AWVS
Free

AWVS

A vulnerability management platform that centralizes security assessment workflows, integrates multiple security tools, and provides collaboration features for security teams.

Acunetix Web Vulnerability Scanner
Free

Acunetix Web Vulnerability Scanner

A tool to run YARA rules against node_module folders to identify suspicious scripts

oneclick
Free

oneclick View oneclick

oneclick is an advanced cloud-based platform that unifies access and distribution for your entire technology stack, streamlining application provisioning. By integrating Software, Platform, and Infrastructure as a Service from diverse on-premises and cloud environments, oneclick offers a single, secure web portal. It acts as a crucial intermediary and separation layer, providing Zero Trust security by protecting all users and company resources regardless of location or provider, effectively creating an immediate-to-deploy, multi-layered secure virtual DMZ.

Centralized cloud access and distribution platform
Unified management of application provisioning
Integration of SaaS, PaaS, and IaaS from any environment