Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

Visit the Product Site

BUFFERZONE is a virtual container that protects any content source that you define as potentially insecure including web browsers, email, Skype, FTP and even removable storage. You are able to definite granular containment poloicies according to network s ...

VendorBufferzone Inc
Pricing ModelCommercial
Modified
Sandboxie

Visit the Product Site

Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data on your computer. Running your Web Browser under the protection of Sandboxie means that all malicous software downloaded by the ...

VendorSandboxie Holdings
Pricing ModelFreeware
Modified
AlgoSec Security Management Suite

Visit the Product Site

The AlgoSec suite delivers a complete, integrated solution for managing complex network security policies -- from the business application layer to the network infrastructure. With powerful visibility across virtual, cloud and physical environments, the A ...

VendorAlgoSec
Pricing ModelCommercial
Modified
MailXaminer

Visit the Product Site

MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...

Category:Forensic Tools
VendorSysTools Software
Pricing ModelShareware
Modified
CYBORG HAWK

Visit the Product Site

CYBORG HAWK LINUX CYBORG HAWK v 1.0 - WORLD'S MOST ADVANCED, POWERFUL AND BEAUTIFUL PENETRATION TESTING DISTRO EVER The Next Generation Penetration Testing Distro. The most advanced, powerful and yet beautiful penetration testing distribution ever crea ...

VendorCYBORG HAWK LINUX
Pricing ModelFreeware
Modified
CodeSonar

Visit the Product Site

CodeSonar is GrammaTech's flagship static analysis software, designed for zero-tolerance defect environments. CodeSonar analyzes source code and binaries, identifying programming bugs that can result in system crashes, memory corruption, leaks, data races ...

VendorGrammaTech Inc
Pricing ModelCommercial
Modified
CheckMarx

Visit the Product Site

Checkmarx is a powerful Source Code Analysis (SCA) solution designed for identifying, tracking and fixing technical and logical security flaws from the root: the source code. Scan uncompiled / unbuilt source code in 16 coding and scripting languages I ...

VendorCheckMark
Pricing ModelCommercial
Modified
CodeNarc

Visit the Product Site

CodeNarc analyzes Groovy code for defects, bad practices, inconsistencies, style issues and more. A flexible framework for rules, rulesets and custom rules means it's easy to configure CodeNarc to fit into your project.

VendorCodeNarc
Pricing ModelFreeware
Modified
PMD

Visit the Product Site

PMD is a source code analyzer. It finds common programming flaws like unused variables, empty catch blocks, unnecessary object creation, and so forth. It supports Java, JavaScript, XML, XSL. Additionally it includes CPD, the copy-paste-detector. CPD find ...

VendorPMD
Pricing ModelFreeware
Modified

Visit the Product Site

OCLint is a static code analysis tool for improving quality and reducing defects by inspecting C, C++ and Objective-C code and looking for potential problems like: Possible bugs - empty if/else/try/catch/finally statements Unused code - unused local v ...

VendorOCLint
Pricing ModelFreeware
Modified
Coverity Code Advisor

Visit the Product Site

The Coverity Code Advisor solution is comprised of Coverity Quality Advisor and Coverity Security Advisor, and uses Coverity Static Analysis Verification Engine (Coverity SAVE) as a foundation for the Coverity Software Testing platform. Coverity SAV ...

VendorCoverity
Pricing ModelCommercial
Modified
HP Fortify on Demand

Visit the Product Site

Fortify on Demand is a cloud-based service. A user uploads the source code, byte code, or binaries of an application, and receives manually reviewed results (generally) in less than 24 hours. Fortify on Demand simplifies the upload process with free autom ...

VendorHP
Pricing ModelService
Modified
HP Fortify Software Security Center Server

Visit the Product Site

With HP Fortify Software Security Center Server, your security and development teams can quickly triage and fix vulnerabilities identified by HP static and dynamic analyzers. A collaborative web-based workspace and repository let them work together using ...

VendorHP
Pricing ModelCommercial
Modified
HP Fortify Source Code Analyzer

Visit the Product Site

HP Fortify Static Code Analyzer scans source code, identifies root causes of software security vulnerabilities and correlates and prioritizes results—giving you line–of–code guidance for closing gaps in your security. To verify that the most serious issue ...

VendorHP
Pricing ModelCommercial
Modified

Visit the Product Site

DynamicMP rapidly baselines your application risk by performing a broad, unauthenticated scan of all public-facing web applications, typically starting with a prioritized list identified by our Discovery technology. DynamicMP: Leverages a massively ...

VendorVeracode
Pricing ModelCommercial
Modified

Visit the Product Site

IBM Security AppScan enhances web application security and mobile application security, improves application security program management and strengthens regulatory compliance. By scanning your web and mobile applications prior to deployment, AppScan enabl ...

VendorIBM
Pricing ModelCommercial
Modified

Visit the Product Site

The Virtual Scan Appliance (VSA) is a pre-configured virtual appliance that implements our DynamicDS (Deep Scan) engine to probe web applications behind the firewall.

VendorVeracode
Pricing ModelCommercial
Modified

Visit the Product Site

DynamicDS (Deep Scan) identifies vulnerabilities, both with and without access credentials, including critical vulnerabilities that are easy to find and exploit in the OWASP Top 10 and the CWE/SANS Top 25.

VendorVeracode
Pricing ModelCommercial
Modified

Visit the Product Site

SAST technology analyzes all code — including open source and third-party components — without requiring access to source code. SAST identifies critical vulnerabilities such as SQL injection, cross-site scripting (XSS), buffer overflows, unhandled error ...

VendorVeracode
Pricing ModelCommercial
Modified

Visit the Product Site

Matt.Net is a simple GUI wrapper around Microsoft's CAT.NET Code Auditing Tool. It can be used to locate .NET binaries within a given folder and will run CAT.NET on all relevant binaries. Any security flaws identified are logged in a local database for ...

VendorNCC Group Plc
Pricing ModelFreeware
Modified