Home / Threat Defense

Threat Defense

Comprehensive threat management, vulnerability assessment, and attack surface monitoring tools

incident handling and digital forensics

Ethio-CERT
Free

Ethio-CERT View Ethio-CERT

Ethio-CERT, the National Cyber Emergency Readiness and Response Team of Ethiopia, is dedicated to safeguarding the nation's cyberspace. By conducting comprehensive proactive and reactive (Incident Response) activities, Ethio-CERT defends against both accidental and deliberate cyber-attacks, ensuring national digital resilience. This pivotal organization operates at the forefront of cybersecurity defense for Ethiopia.

National Cyber Defense
Incident Response
Proactive Threat Detection
CERT-In
Free

CERT-In View CERT-In

CERT-In is India's premier national computer security incident response team, operating under the Ministry of Electronics & Information Technology. Its core mission is to safeguard India's cyberspace through proactive incident prevention, swift and effective response services, and comprehensive security quality management. CERT-In plays a vital role in enhancing national cybersecurity posture and mitigating digital threats.

National Computer Security Incident Response
Cyber Threat Prevention Services
Incident Response and Mitigation
Casco
Free

Casco View Casco

Casco provides robust security for AI agents and applications by proactively simulating sophisticated attacks. Our platform rigorously tests your AI systems to uncover vulnerabilities, offering actionable insights and guided remediation to strengthen your defenses against evolving AI-specific threats. Ensure your AI deployments are secure and resilient, mitigating costly breaches and maintaining operational integrity.

Proactive AI attack simulation
Automated vulnerability detection
Guided remediation workflows
C3.ai Digital Transformation Institute
Free

C3.ai Digital Transformation Institute View C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute (DTI) is a premier research consortium pioneering the advancement and adoption of artificial intelligence across business, government, and societal sectors. By convening top global scientists, DTI drives innovation in the Science of Digital Transformation, an interdisciplinary field encompassing AI, machine learning, cloud computing, IoT, big data analytics, organizational behavior, public policy, and ethics. Through its competitive grant program, managed by UC Berkeley and UIUC, DTI supports groundbreaking research and practitioner training to accelerate the real-world impact of digital transformation.

World-class scientific research consortium
Focus on the Science of Digital Transformation
Interdisciplinary research areas (AI, ML, IoT, Big Data, Ethics, etc.)
Feroot Security
Free

Feroot Security View Feroot Security

Feroot Security empowers organizations to proactively secure their client-side web applications and safeguard the digital user experience. Our comprehensive solutions automate the discovery, analysis, and real-time protection of JavaScript assets, mitigating the risks associated with client-side cyber threats. By simplifying data protection and threat management, Feroot enables businesses to deliver secure, uncompromised online interactions for every customer.

Automated client-side asset discovery and inventory
Real-time protection against client-side cyber attacks
Comprehensive JavaScript security analysis
Cerby
Free

Cerby View Cerby

Cerby revolutionizes application security by transforming it into an employee productivity enhancer. We empower teams to deploy, access, and share technology securely, mitigating risks associated with unmanaged applications. By automating the protection of your brand against common security misconfigurations like shared passwords and disabled 2FA, Cerby proactively defends your business and data from sophisticated threats, ensuring seamless security so your team can focus on innovation.

Automated brand protection against application misconfigurations
Enhanced employee productivity through streamlined secure access
Proactive defense against shared password risks
Appurity
Free

Appurity View Appurity

Appurity delivers comprehensive mobile and application security solutions designed to protect your business-critical data. Recognizing that mobile devices and applications are primary attack vectors, Appurity offers end-to-end security strategies, safeguarding information whether it's at rest, in transit, or across your endpoint, cloud, and on-premise environments. As an Android Enterprise Service Provider and Apple Consultants Network member, we craft bespoke solutions tailored to your specific industry needs, ensuring robust protection without compromising employee accessibility.

End-to-end mobile and application security
Data protection at rest, in transit, and at the endpoint
Cloud and on-premise security solutions
Robo Shadow
Free

Robo Shadow View Robo Shadow

Robo Shadow democratizes enterprise-grade cybersecurity by delivering an advanced AI-powered Attack Surface Management platform built on Microsoft, Google, and AWS technologies. Our solution bridges the gap for organizations by providing sophisticated tools and expert, UK-based support, enabling proactive threat defense and simplifying the understanding of your cyber posture. Transition to efficient 'Daily Sec Ops' with intuitive daily reporting, moving beyond the stress of annual penetration tests to continuous, manageable security insights.

AI-Powered Attack Surface Management
Multi-Cloud Infrastructure (AWS, Azure, GCP)
Proactive Threat Detection and Defense
ZeroFox EASM
Free

ZeroFox EASM View ZeroFox EASM

A dark web monitoring platform that scans dark and deep web sources to detect exposed organizational data, compromised credentials, domain spoofing, and supply chain threats.

XRATOR
Free

XRATOR View XRATOR

A threat intelligence platform that provides comprehensive visibility into an organization's attack surface by collecting, analyzing, and structuring threat data to enable proactive security measures against emerging threats.

Quantstamp
Free

Quantstamp View Quantstamp

Quantstamp is the premier blockchain security firm dedicated to safeguarding digital assets for the Web3 ecosystem. Leveraging extensive expertise and rigorous auditing methodologies, we have protected billions in value and established ourselves as a trusted partner for leading projects like Aave, Compound, and Polygon. Beyond our core security services, Quantstamp actively fosters Web3 growth through strategic investments and advisory roles, ensuring the long-term security and scalability of innovative decentralized applications.

Comprehensive Blockchain Audits
Smart Contract Security Analysis
Web3 Security Consulting
CYRIN
Free

CYRIN View CYRIN

CYRIN® is a cutting-edge, cloud-based cyber range that redefines cybersecurity training. It offers an immersive virtual environment where professionals can practice with authentic tools and tackle realistic attack scenarios. CYRIN ensures continuous skill development and readiness with unparalleled depth of training content, accessible anytime, anywhere, without the need for specialized software.

Next-generation cloud-based cyber range
Realistic training with real tools and scenarios
Immersive virtual environment for each user
Cyber Range Malaysia
Free

Cyber Range Malaysia View Cyber Range Malaysia

Cyber Range Malaysia offers a cutting-edge platform designed to elevate cybersecurity training and preparedness. Leveraging advanced simulation technologies, we empower organizations and individuals to hone their defensive and offensive cybersecurity skills in a realistic, controlled environment. Our comprehensive programs are built to bridge the gap between theoretical knowledge and practical application, ensuring a highly skilled and resilient cybersecurity workforce.

Realistic Cyber Attack and Defense Simulations
Hands-on Training for Security Professionals
Customizable Training Scenarios
US Cyber Range
Free

US Cyber Range View US Cyber Range

US Cyber Range offers a dynamic, cloud-based platform designed for advanced cybersecurity training. It provides hyper-realistic virtual environments, simulating real-world networks, tools, and threats to cultivate essential cyber practitioner skills. This scalable solution empowers security teams and individuals to hone their abilities through customizable labs and military-grade simulations, ensuring preparedness against sophisticated cyberattacks.

Scalable, cloud-hosted infrastructure
Hyper-realistic virtual training environments
Military-grade cybersecurity simulation
PurpleSynapz
Free

PurpleSynapz View PurpleSynapz

PurpleSynapz offers hyper-realistic cybersecurity training through a state-of-the-art Cyber Range, addressing the critical talent shortage in the industry. Our curriculum, powered by QOS Technology, simulates real-world network environments and attack scenarios. This allows individuals and organizations to gain hands-on experience with industry-standard tools and tactics, honing essential skills to effectively defend against modern cyber threats in a safe, practical lab setting.

Hyper-realistic Cyber Range with QOS Technology
Modern, practical cybersecurity curriculum
Simulated cyberwarfare and real-life attack scenarios
Cyber Ranges
Free

Cyber Ranges View Cyber Ranges

Cyber Ranges redefines cyber readiness by offering a next-generation platform for developing advanced cyber capabilities and rigorously validating security skills and organizational resilience. Leveraging cloud-native technology, it orchestrates the entire lifecycle of realistic, simulation-based cyber security training experiences. This approach ensures unparalleled depth and scalability, surpassing traditional virtualization limitations and empowering organizations to meet the most demanding cyber defense scenarios.

Next-generation cloud-native cyber range platform
Comprehensive lifecycle management of realistic cyber scenarios
World-class cyber security training and capability development
National Cyber Security Directorate (DNSC) - Romania
Free

National Cyber Security Directorate (DNSC) - Romania View National Cyber Security Directorate (DNSC) - Romania

The National Cyber Security Directorate (DNSC) of Romania, formerly CERT-RO, is the national authority dedicated to safeguarding Romania's civil cyberspace. As a specialized government body, DNSC is mandated to prevent, analyze, detect, and respond to cyber incidents, ensuring the resilience of national cyber infrastructure through the development and dissemination of comprehensive public policies. Their expertise encompasses proactive threat mitigation and reactive incident management, contributing to a secure digital environment for the nation.

National cyber security incident response
Development of national cyber security policies
Cyber incident prevention and analysis
National Cyber Security Centre (NKSC) - Lithuania
Free

National Cyber Security Centre (NKSC) - Lithuania View National Cyber Security Centre (NKSC) - Lithuania

The National Cyber Security Centre (NKSC) of Lithuania is the principal governmental authority dedicated to fortifying the nation's cyberspace. It spearheads unified cyber incident management, enforces security requirements, and serves as the central hub for cyber security expertise. Committed to a robust national cyber defense, the NKSC actively implements cyber security policy, conducts vital research, and provides essential assistance to state institutions, businesses, and citizens to foster a resilient digital environment.

Unified Cyber Incident Management
Cyber Security Requirements Monitoring and Control
National Cyber Security Policy Implementation
CERT.hr
Free

CERT.hr View CERT.hr

CERT.hr serves as the national authority responsible for the prevention, detection, and response to cyber threats impacting the public information systems of the Republic of Croatia. Collaborating strategically with domestic entities like the Information Systems Security Bureau (ZSIS CERT) and international bodies through organizations such as FIRST, CERT.hr actively mitigates cyber risks and enhances national digital security posture.

National authority for cyber threat prevention and protection
Focus on public information systems in Croatia
Cooperation with national security and interior ministries
Cybersecurity Tech Accord
Free

Cybersecurity Tech Accord View Cybersecurity Tech Accord

The Cybersecurity Tech Accord unites leading global technology companies in a shared commitment to a safer and more secure digital future. By fostering unprecedented collaboration and sharing best practices, the Accord's signatories actively work to protect customers and users from evolving cyber threats. This alliance drives impactful initiatives that enhance the stability and resilience of cyberspace, leveraging collective industry expertise for proactive defense and decisive action against malicious actors.

Global technology company collaboration
Commitment to customer and user protection
Advancing cybersecurity initiatives
Kernelios
Free

Kernelios View Kernelios

Kernelios is a premier simulator-based training center and incubator dedicated to cultivating the next generation of global cybersecurity experts. Our state-of-the-art Cyber Command Knowledge Center delivers a uniquely professional and innovative curriculum designed to equip aspiring professionals with comprehensive cybersecurity knowledge and practical skills. We empower students to become invaluable knowledge centers within their own organizations, fostering a new standard in cyber defense.

Advanced simulator-based cybersecurity training
World-first dedicated Cyber Command Knowledge Center
Comprehensive curriculum for aspiring experts
GlobalPass
Free

GlobalPass View GlobalPass

GlobalPass delivers comprehensive data protection and application security solutions designed to meet the diverse needs of businesses, from startups to enterprises. By integrating robust PDF Digital Rights Management (DRM) with expert legal advisory and proactive cybersecurity measures, GlobalPass empowers organizations to safeguard sensitive information, prevent unauthorized access and piracy, and mitigate cyber risks effectively.

Tailored solutions for businesses of all sizes
Robust PDF DRM for document protection
Prevention of unauthorized access, misuse, and leakage
Disklabs
Free

Disklabs View Disklabs

Disklabs is a premier provider of data recovery, digital forensics, and data erasure services since 1997. Leveraging state-of-the-art laboratories and specialized facilities, we offer expert solutions for criminal justice, national security, and corporate needs. Our services, including advanced data recovery, forensic investigations, and secure data erasure, are trusted by law enforcement, government agencies, and the general public.

Industry-leading data recovery services
Specialized digital forensics laboratories
Secure and accredited data erasure solutions
CyberSentriq
Free

CyberSentriq View CyberSentriq

CyberSentriq is a comprehensive cybersecurity and data protection platform specifically designed for Managed Service Providers (MSPs). By integrating best-of-breed solutions, it delivers advanced, AI-driven email and web security, robust data protection, and ensures operational resilience for over 150,000 SMBs worldwide. This unified platform empowers MSPs to proactively defend against evolving cyber threats and safeguard their clients' critical assets.

AI-driven email and web security
Advanced data protection and backup
Proactive threat detection and prevention
BlackFog
Free

BlackFog View BlackFog

BlackFog delivers advanced device data privacy, robust data security, and proactive ransomware prevention through its pioneering on-device anti-data exfiltration (ADX) technology. By employing sophisticated behavioral analysis, BlackFog preemptively neutralizes cyber threats like ransomware, spyware, malware, and unauthorized data collection before they can impact your organization, ensuring enterprise compliance with global privacy regulations across all endpoints.

On-device Anti-Data Exfiltration (ADX) Technology
Behavioral Analysis for Threat Detection
Ransomware Prevention
YALIH YALIH
Free

YALIH YALIH View YALIH YALIH

A simple honeypot that collects credentials across various protocols

xxeserv
Free

xxeserv View xxeserv

Uploader honeypot designed to look like poor website security.

xss2png
Free

xss2png View xss2png

Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.

National Cyber Security Center (NCSC) - Hungary
Free

National Cyber Security Center (NCSC) - Hungary View National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center (NCSC) of Hungary, established in 2015, consolidates the expertise of GovCERT-Hungary, NEISA, and the Cyber Defence Management Authority. This unified entity enhances coordination and efficiency in managing Hungary's national cybersecurity landscape. The NCSC actively supports the entire information security lifecycle, from strategic planning and regulation to proactive vulnerability assessment and responsive incident handling, ensuring the robust protection of national electronic information systems.

Integrated national cybersecurity coordination
Government Computer Emergency Response Team (GovCERT) operations
National Electronic Information Security Authority (NEISA) functions
FIRST Conference
Free

FIRST Conference View FIRST Conference

The FIRST Conference is the premier annual gathering for incident response and security professionals worldwide, organized by the Forum of Incident Response and Security Teams (FIRST). This intensive 4-5 day event fosters knowledge exchange and collaboration among global experts, covering the latest trends in incident response, vulnerability analysis, and cybersecurity management. Attendees gain invaluable insights from diverse international speakers, including keynotes from outside the FIRST community, addressing critical international security challenges and best practices.

Annual global event for incident response and security teams
Expert-led sessions on incident response and prevention
Vulnerability analysis and computer security best practices
CyberUSA
Free

CyberUSA View CyberUSA

CyberUSA is a vital non-profit organization uniting leaders and states to accelerate innovation, education, workforce development, and cyber readiness across the United States and its Allied partners. By fostering a robust 'community of communities,' CyberUSA enhances information sharing and improves cyber resilience at local, regional, and national levels through a dedicated communication framework, impactful national summits, and curated resources. We actively invite technology councils, chambers of commerce, cyber groups, ISAOs, ISACs, and other trusted membership organizations to join our collaborative ecosystem and strengthen collective cybersecurity posture.

National Cyber Readiness and Resilience Initiatives
Information Sharing Framework
Workforce Development and Education Programs
HCL Technologies
Free

HCL Technologies View HCL Technologies

Integrated portfolio of Digital, IoT, Cloud, and Automation solutions
Next-generation Cybersecurity services with a 'Dynamic Cybersecurity Framework'
Expertise in Analytics and Infrastructure Management

National Cyber Security Strategy

Information & eGovernment Authority (iGA) - Bahrain
Free

Information & eGovernment Authority (iGA) - Bahrain View Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority (iGA) of Bahrain is a pivotal government entity dedicated to advancing the nation's IT sector and ensuring robust information security and efficient radiocommunication management. Through its specialized directorates within the Information Security and Radiocommunications sector, iGA provides comprehensive protection for government networks, upholds data confidentiality, and champions a secure digital environment free from interference and cyber threats.

Government network security and protection
Information confidentiality and data security
Radio spectrum management
Andrisoft
Free

Andrisoft View Andrisoft

Andrisoft delivers WANGUARD, a robust anti-DDoS software solution engineered to safeguard networks against sophisticated Distributed Denial of Service attacks. Leveraging advanced packet-based and flow-based sensors, WANGUARD actively monitors IP traffic, filtering malicious packets and employing BGP black-holing to neutralize threats. Since its inception in 2006, Andrisoft has specialized in providing comprehensive solutions for Network Operation Centers, focusing on traffic monitoring, accounting, DDoS protection, and robust policy enforcement for IP networks.

Comprehensive anti-DDoS software solution
Packet-based and flow-based traffic monitoring
Real-time malicious packet filtering
RedMimicry
Free

RedMimicry View RedMimicry

RedMimicry is a semi-automated platform engineered to realistically emulate sophisticated cyberattacks, enabling organizations to rigorously test and validate their cyber defense strategies. Unlike fully automated tools, RedMimicry supports deliberate, step-by-step execution of attack campaigns, allowing for deeper insights into security control effectiveness and providing unique opportunities for adversaries to deviate and execute custom actions during exercises. This empowers security teams and CISOs to proactively identify weaknesses, continuously refine defensive postures, and enhance their overall cybersecurity resilience against current and emerging threats, making it an ideal solution for efficient red and purple team operations.

Semi-automated, step-by-step attack emulation
Realistic mimicry of advanced threat actor behaviors
Flexible playbook execution with custom command integration
Rebellion Defense
Free

Rebellion Defense View Rebellion Defense

Rebellion Defense is a leading technology company empowering mission-critical organizations with advanced software solutions to proactively defend against evolving cyber threats. By integrating world-class commercial software engineering talent with deep defense and national security expertise, Rebellion Defense delivers unparalleled capabilities for cyber readiness and software security.

Automated adversary emulation for comprehensive defense testing
Realistic threat simulation leveraging APT techniques
Discovery of mission exposure to global cyber threats
Insta Group
Free

Insta Group View Insta Group

Insta Group is a trusted cybersecurity partner dedicated to safeguarding security-critical organizations. Leveraging 30 years of expertise and Finnish engineering, we provide comprehensive solutions to identify vulnerabilities, protect critical assets, and enhance detection and response capabilities. Our specialized services include PKI, data encryption, SIEM, SOC, and penetration testing, all designed to bolster your digital resilience in an evolving threat landscape.

Expert PKI and Data Encryption Services
End-to-End SIEM and SOC Solutions
Advanced Penetration Testing and Vulnerability Assessment
Wotan Monitoring
Free

Wotan Monitoring View Wotan Monitoring

Wotan Monitoring offers a comprehensive, fully automated solution for process, infrastructure, and end-to-end monitoring, essential for navigating increasingly digitized business operations. By providing vital IT baseline protection and intelligent escalation management, Wotan minimizes IT risks and prevents costly business outages. Leverage the power of collected data for robust risk analysis and strategic process optimization, ensuring your organization maintains operational integrity and security posture.

Fully Automatic Process Monitoring
Comprehensive Infrastructure Monitoring
End-to-End Transaction Tracking
Visium Technologies
Free

Visium Technologies View Visium Technologies

Visium Technologies delivers unparalleled global cybersecurity clarity through advanced data modeling, contextual visualizations, and AI-driven analytics. Our offerings empower enterprises to safeguard critical assets, including data, business applications, and IoT devices across on-premises and cloud environments. Leveraging our proprietary CyGraph platform, we provide intuitive, hyper-contextual visualizations for rapid root cause determination and remediation, ensuring robust protection of the enterprise operating landscape.

AI-driven Cybersecurity Analytics
Contextual Data Visualization
Data Modeling and Mapping
RU-CERT
Free

RU-CERT View RU-CERT

RU-CERT serves as the national Computer Security Incident Response Team (CSIRT) for the Russian Federation, dedicated to preventing and responding to cyber incidents impacting resources within the country. We offer specialized computer incident prevention and response services, acting as a critical point of contact for users experiencing security breaches. RU-CERT also facilitates crucial connections with Russian incident response teams, abuse services, and law enforcement agencies to ensure comprehensive resolution and support for cyber threats originating or affecting Russian Federation territories.

National CERT/CSIRT for the Russian Federation
Computer incident prevention and response services
Focus on incidents related to Russian Federation resources

Smart Contract Auditing & Security

GoPlus Security
Free

GoPlus Security View GoPlus Security

GoPlus Security is the foundational security infrastructure for the Web3 ecosystem, offering open, permissionless, and user-driven security services across multiple chains. Its comprehensive engine provides multidimensional risk detection for both crypto projects and individual users, fostering a safer and more secure blockchain environment. GoPlus offers a dynamic and automated platform encompassing token, NFT, malicious address, approval, and dApp contract security, alongside customizable solutions.

Multi-chain Security Infrastructure
Token and NFT Risk Detection
Malicious Address Identification
Zerobait
Free

Zerobait View Zerobait

Zerobait is a subscription based platform for brand protection. We process millions of data points and use AI/ML to detect phishing and impersonation sites targeting our clients, helping businesses prevent fraud and protect customers.

Red Hand Analyzer
Free

Red Hand Analyzer View Red Hand Analyzer

Red Hand Analyzer runs your PCAP file through an automated behavior analysis model to identify network patterns commonly associated with malicious hacker techniques, often missed by signature-based detection engines.

Yomi
Free

Yomi View Yomi

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

Zero Day Initiative Published Advisories
Free

Zero Day Initiative Published Advisories View Zero Day Initiative Published Advisories

A free and open-source tool for identifying vulnerabilities in Joomla-based websites.

Yasuo
Free

Yasuo View Yasuo

A GitHub App that monitors GitHub organizations or repositories for adherence to security best practices and detects policy violations.

Yara Validator
Free

Yara Validator View Yara Validator

A Capture The Flag (CTF) platform for testing computer security skills

oneclick
Free

oneclick View oneclick

oneclick is an advanced cloud-based platform that unifies access and distribution for your entire technology stack, streamlining application provisioning. By integrating Software, Platform, and Infrastructure as a Service from diverse on-premises and cloud environments, oneclick offers a single, secure web portal. It acts as a crucial intermediary and separation layer, providing Zero Trust security by protecting all users and company resources regardless of location or provider, effectively creating an immediate-to-deploy, multi-layered secure virtual DMZ.

Centralized cloud access and distribution platform
Unified management of application provisioning
Integration of SaaS, PaaS, and IaaS from any environment