Skip to main content

Michele M Jordan

The Viasat Eclypt Freedom is an encrypted, portable drive that gives fast access to secure data. Accredited by government organizations around the world to protect important data, the Eclypt Freedom uses advanced hardware-based full disk encryption. In t ...

Eclypt Freedom Encrypted External Hard Drive
Tim Tomes / Black Hills Information Security

Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in whic ...

Recon-ng
BlackArch- multiple voluntary contributors

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. 

Stratus Engineering

The EZ-Tap Pro is an industry leading protocol analyzer.

Zyxel Communications Corp

Get protection from malware and unauthorized application for your business. Keep your business running smoothly without downtime by protecting your network from outside threats. Deliver collaborative approach to complex security threats with unified manag ...

ZyXEL Next-Gen Firewall
Zyxel Communications Corp

Zyxel's ZyWALL Security solutions provide real-time protection that ensure service continuity, optimal CP performance and improved network control. Three product lines to address every size from SMB to Enterprise.

Zyxel Next-Gen Unified Security Gateway
Zyxel Communications Corp

Reinforce security for hybrid network with SecuExtender as the Zero Trust agent, integrated always-on IPSec VPN, traffic shaping, IKEv2/EAP, supporting devices insight and more granular control over remote workplaces.

Category VPN Clients
SecuExtender Zero Trust VPN Client

Omega Core Audit provides a software security solution to help customers approach the complex and difficult security challenges in Oracle Database Systems - protecting against outsider and/or insider threats, unauthorized access and enforcing duty separat ...

Omega Core Audit
Fidelis Cybersecurity

 Adversaries want your data and assets. Fidelis Deception makes them believe they’ve struck gold. But what they’ve really done is trapped themselves and alerted your cyber defenders. Automatically create and deploy authentic deception layers based o ...

Category IPS Network
Fidelis Deception
Jordan Wright

Gophish is an open-source phishing toolkit meant to help pentesters and businesses conduct real-world phishing simulations. It is a phishing framework in the Go programming language, released as compiled binaries with no dependencies.

Lucy Phishing GmbH

The LUCY Social Engineering Suite and Malware Testing Suite (or CYBERSECURITY CRASH TEST DUMMY) facilitate multiple application areas. They can be used for: – People testing and education – Technology assessments – An inoffensive penetration test sho ...

LUCY
Risk Based Security

VulnDB is the most comprehensive and timely vulnerability intelligence available and provides actionable information about the latest in security vulnerabilities via an easy-to-use SaaS Portal, or a RESTful API that allows easy integration into GRC tool ...

VulnDB
IPFire Project

With IPFire you can easily deploy many variations of it, such as a firewall, a proxy server or a VPN gateway. IPFire forms the base of a secure network. It has the power to segment networks based on their respective security levels and makes it easy to cr ...

IPFire Firewall

Omega DB Security Reporter is a security auditing and software-only solution for Oracle Databases. Implementing quick reporting, visualisation and documentation of the security posture of the Oracle database on the following security areas: System Priv ...

Automox is fully automated and able to patch every operating system (Windows, Mac OSX, and Linux) along with critical applications like Java, Firefox, Adobe, Chrome and others - all from a single dashboard.Our platform enables you to see the vulnerability ...

AutoMox
Stellar Data Recovery

Bitraser is a certified and secure data erasing software which permanently deletes hard disk data beyond the scope of data recovery. It supports multiple international erasure standards such as DoD 3 passes / 7 passes and NIST.

Bitraser
Montreat College

The Center for Cybersecurity Education and Leadership at Montreat College provides guidance and oversight to our academic program, to the distribution of cyber defense information, and to collaborative efforts in cybersecurity with an emphasis on combinin ...

Montreat College Cybersecurity Degree
Kaspersky Lab

Cybercriminals exploit unpatched vulnerabilities in operating systems and common applications (Java, Adobe, Internet Explorer, Microsoft Office, etc.) as part of targeted attacks against businesses of every size. This risk is compounded by increasing IT ...

Kaspersky Vulnerability & Patch Management

Real-time threat detections across endpoints, data centers, and the cloud. Securing your network against advanced persistent threats (APTs) requires greater visibility to detect actors and their actions so that you can reduce your response time. As threa ...

LogRhythm NDR

RVAsec is the first Richmond, VA based security convention that showcases local talent as well as brings the best speakers to the midatlantic region.  RVAsec attracts over 400 security professionals from across the country.  The conference is dual-track a ...