Skip to main content

List Categories and Listings by B

The BrightCloud File Reputation Service provides next-generation Webroot threat intelligence by offering customers a dynamic, up-to-the-minute file reputation service to protect their data and assets. This real-time lookup service of known malicious and w ...

Category Guards Web

The BrightCloud Mobile App Reputation Service helps vendors who provide mobile management and security solutions address the new security vulnerabilities that mobility creates. Powered by the Webroot® Intelligence Network (WIN), the service continuously a ...

Category Mobile Devices

The BrightCloud Mobile Security SDK for Android™ and iOS® addresses mobile device vulnerabilities by enabling mobile management partners to offer enhanced security for their customers. It features antivirus, antimalware, device and application interrogati ...

Category Mobile Devices
BlackArch- multiple voluntary contributors

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. 

Stellar Data Recovery

Bitraser is a certified and secure data erasing software which permanently deletes hard disk data beyond the scope of data recovery. It supports multiple international erasure standards such as DoD 3 passes / 7 passes and NIST.

Bitraser
Barracuda Networks, Inc.

The Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service (DoS) attacks. By combining both p ...

Category WAF - Cloud
Barracuda Web Application Firewall
OpenStack Security Group

Bandit is a tool designed to find common security issues in Python code. By processing files, building an AST and running appropriate plugins against the AST nodes, Bandit is able to generate a report once it has finished scanning code.

bandit
Liverpool John Moores University

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. We've developed our cybersecurity policy and management degree in conjunctio ...

Bachelor - Cybersecurity Management and Policy
London Metropolitan University

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. About the Software Development and Security Bachelor's Degree Your software d ...

Bachelor - Software Development and Security

Bitwarden makes it easy to generate, store, and secure unique passwords from any location or device. Bitwarden is Open Source and third party audited. Install and Sync all of your devices Secure cloud syncing features allow you to access your data from ...

Bitwarden

Simulate Email Threats Teach your users to identify and respond to potential security risks. Select from a selection of real-world threat templates, taken directly from Barracuda’s threat database, and expose your users to the latest email thre ...

Barracuda Security Awareness Training
Risk Analysis Consultants

RAC Information Security Training Centre offers a standard set of computer forensic training courses. We offer, as an extension to our standard set of training courses, "Hot-spot workshops" based on your relevant problems. These workshops are oriented to ...

btscanner is a tool designed specifically to extract as much information as possible from a Bluetooth device without the requirement to pair. A detailed information screen extracts HCI and SDP information, and maintains an open connection to monitor the R ...

code bt_audit

small bluetooth audit suit containing psm_scan, rfcomm_scan and a script for generating database entries for btdsd

BlueSpam searches for all discoverable bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send. To customize the message that should be send you need a palm with an SD/MMC card, then you create th ...

Collin Mulliner and Martin Herfurt

Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth sec ...

trifinite.group

Blooover II is the successor of the very popular application Blooover. After 150000 downloads of Blooover, a new version of this mobile phone auditing toool is on its ready. Besides the BlueBug attack, Blooover II supports the HeloMoto attack (which is qu ...

Blooover II

Bluesnarfer will download the phonebook of any mobile device vulnerable to bluesnarfing.

Bluesnarfer
BullGuard Ltd.

BullGuard Internet Security inspects your system prior to installation, removes any active malware and adapts to your system specifications. This process ends with a check to ensure the very latest virus definitions are installed. In no time, BullGuard is ...

BullGuard Internet Security

The BizGuardian Firewall provides the most reliable Unix Kernel (FreeBSD) customized in a highly secure, easy to install software appliance that can turn any old Pentium class computer into a high performance Firewall. The complexity of installing Unix, a ...