Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

LogRhythm Threat Lifecycle Management

Visit the Product Site

The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. The capabilities include Security Intelligence, SIEM, Security Analytics, Log Management, Network Monitoring and Forensics & Endpoint Monitoring. It b ...

VendorLogRhythm
Pricing ModelCommercial
Modified

MSI Simple Phish

0 reviews

Visit the Product Site

A free tool that provides a simple, safe and effective mechanism for security teams and administrators to run their own phishing tests inside their organization. Simply install the application on a server or workstation and create a url email/sms/etc. cam ...

VendorMicroSolved, Inc.
Pricing ModelFreeware
ModifiedNever
Tags

Duo Insight

0 reviews

Visit the Product Site

Duo Insight is a free phishing assessment tool by Duo Security that allows you to find vulnerable users and devices in minutes and start protecting them right away.

VendorDuo Security
Pricing ModelOnline Use Only
ModifiedNever
Tags

ThreatSim

0 reviews

Visit the Product Site

ThreatSim attack simulation product provides a phishing-focused security awareness training program. The ThreatSim mock attack system allows you to deliver simulated phishing emails with embedded Teachable Moments, which display targeted "just-in-time tea ...

VendorWombat Security Technologies
Pricing ModelService
ModifiedNever
Tags

SecurityIQ

0 reviews

Visit the Product Site

SecurityIQ combines a phishing simulator and computer-based security awareness training in one cloud-based service.

VendorInfoSec Institute
Pricing ModelOnline Use Only
ModifiedNever
Tags

Visit the Product Site

For phishing, SET allows for sending spear-phishing emails as well as running mass mailer campaigns, as well as some more advanced options, such as flagging your message with high importance and adding list of target emails from a file. SET is Python base ...

VendorTrustedSec
Pricing ModelOpen Source
ModifiedNever
Tags

Visit the Product Site

SPF (SpeedPhish Framework) is a python tool designed to allow for quick recon and deployment of simple social engineering phishing exercises. SPF includes many features that allow you to quickly configure and perform effective phishing attacks, including ...

VendorAdam Compton
Pricing ModelOpen Source
ModifiedNever
Tags

King Fisher

0 reviews

Visit the Product Site

King Phisher is a tool for testing and promoting user awareness by simulating real world phishing attacks. It features a flexible architecture allowing full control over both emails and server content. King Phisher can be used to run campaigns ranging fro ...

VendorSecureState
Pricing ModelOpen Source
Modified
Tags

Phishing Frenzy

0 reviews

Visit the Product Site

Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns. The goal of the project is to streamline the phishing process while still providing clients the best realistic phishi ...

VendorBrandon McCann
Pricing ModelOpen Source
Modified
Tags

LUCY

0 reviews
LUCY

Visit the Product Site

The LUCY Social Engineering Suite and Malware Testing Suite (or CYBERSECURITY CRASH TEST DUMMY) facilitate multiple application areas. They can be used for: – People testing and education – Technology assessments – An inoffensive penetration test sho ...

VendorLucy Phishing GmbH
Pricing ModelCommercial
Modified
Tags

Gophish

0 reviews

Visit the Product Site

Gophish is an open-source phishing toolkit meant to help pentesters and businesses conduct real-world phishing simulations. It is a phishing framework in the Go programming language, released as compiled binaries with no dependencies.

VendorJordan Wright
Pricing ModelOpen Source
Modified
Tags

DECOYnet

0 reviews

Visit the Product Site

DECOYnet learns the organizational network and deploys decoys that mirror valuable assets, applications and data. Then, it intelligently places mini-traps on endpoints and servers to lure attackers into the decoy – exposing their presence, slowing their a ...

Category:IPS Network
VendorTopSpin Security
Pricing ModelCommercial
Modified

Visit the Product Site

Fireglass Threat Isolation Platform eliminates malware and phishing by isolating critical attack vectors including web pages, emails and documents. Transparent Clientless Rendering (TCR) technology transforms all web content into a safe visual stream and ...

VendorFireglass
Pricing ModelCommercial
Modified

Verisys Popular

0 reviews
Verisys

Visit the Product Site

Verisys is an system and file integrity monitoring solution for Windows, Linux and network devices that allows you to maintain the integrity of business critical files and data by detecting unauthorised changes. Verisys is easily configured to suit your ...

VendorIonx
Pricing ModelCommercial
Modified

ZyXEL VPN Client

0 reviews
ZyXEL VPN Client

Visit the Product Site

ZyXEL VPN Clients offer a VPN solution that provides mobile and distributed users with access back to corporate resources. ZyXEL offers both SSL VPN and IPSec VPN connectivity options for remote client-to-site access. ZyXEL VPN Client works with ZyXEL ...

Category:VPN Clients
VendorZyxel Communications Corp
Pricing ModelCommercial
ModifiedNever
Zyxel Next-Gen Unified Security Gateway

Visit the Product Site

Zyxel's ZyWALL Security solutions provide real-time protection that ensure service continuity, optimal CP performance and improved network control. Three product lines to address every size from SMB to Enterprise.

VendorZyxel Communications Corp
Pricing ModelCommercial
ModifiedNever
ZyXEL Unified Security Gateway

Visit the Product Site

The ZyXEL USG 20/20W Series is designed for small business to provide real-time inspection and multi-layer network protection to prevent the network from threats. The USG Series embodies Stateful Packet Inspection (SPI) Firewall, Content Filtering, Anti-S ...

VendorZyxel Communications Corp
Pricing ModelCommercial
Modified

EZ-Tap Pro

0 reviews

Visit the Product Site

The EZ-Tap Pro is an industry leading protocol analyzer.

VendorStratus Engineering
Pricing ModelCommercial
Modified
Forcepoint Stonesoft Next Generation Firewall

Visit the Product Site

The Forcepoint™ Stonesoft Next Generation Firewall meets both demands by integrating application control, sophisticated evasion prevention and an intrusion prevention system (IPS) into a single solution that is cost-effective and easy to deploy. It has a ...

Category:IPS Network
VendorForcepoint
Pricing ModelCommercial
Modified

BlackArch Linux

0 reviews
BlackArch Linux

Visit the Product Site

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. 

VendorBlackArch- multiple voluntary contributors
Pricing ModelOpen Source
Modified