Skip to main content

List Categories and Listings by B

Webroot
Commercial

The BrightCloud Mobile App Reputation Service helps vendors who provide mobile management and security solutions address the new security vulnerabilities that mobility creates. Powered by the Webroot® Intelligence Network (WIN), the service continuously a ...

Category Mobile Devices
Webroot
Commercial

The BrightCloud Mobile Security SDK for Android™ and iOS® addresses mobile device vulnerabilities by enabling mobile management partners to offer enhanced security for their customers. It features antivirus, antimalware, device and application interrogati ...

Category Mobile Devices
BlackArch- multiple voluntary contributors
Open Source

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. 

Stellar Data Recovery
Commercial

Bitraser is a certified and secure data erasing software which permanently deletes hard disk data beyond the scope of data recovery. It supports multiple international erasure standards such as DoD 3 passes / 7 passes and NIST.

Bitraser
Barracuda Networks, Inc.
Commercial

The Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service (DoS) attacks. By combining both p ...

Category WAF - Cloud
Barracuda Web Application Firewall
OpenStack Security Group
Open Source

Bandit is a tool designed to find common security issues in Python code. By processing files, building an AST and running appropriate plugins against the AST nodes, Bandit is able to generate a report once it has finished scanning code.

bandit
Liverpool John Moores University
Open Source

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. We've developed our cybersecurity policy and management degree in conjunctio ...

Bachelor - Cybersecurity Management and Policy
London Metropolitan University
Open Source

UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. About the Software Development and Security Bachelor's Degree Your software d ...

Bachelor - Software Development and Security
Bitwarden
Open Source

Bitwarden makes it easy to generate, store, and secure unique passwords from any location or device. Bitwarden is Open Source and third party audited. Install and Sync all of your devices Secure cloud syncing features allow you to access your data from ...

Bitwarden
Barracuda
Commercial

Simulate Email Threats Teach your users to identify and respond to potential security risks. Select from a selection of real-world threat templates, taken directly from Barracuda’s threat database, and expose your users to the latest email thre ...

Barracuda Security Awareness Training
Risk Analysis Consultants

RAC Information Security Training Centre offers a standard set of computer forensic training courses. We offer, as an extension to our standard set of training courses, "Hot-spot workshops" based on your relevant problems. These workshops are oriented to ...

Kali Linux
Freeware

btscanner is a tool designed specifically to extract as much information as possible from a Bluetooth device without the requirement to pair. A detailed information screen extracts HCI and SDP information, and maintains an open connection to monitor the R ...

code bt_audit

small bluetooth audit suit containing psm_scan, rfcomm_scan and a script for generating database entries for btdsd

PalmOS

BlueSpam searches for all discoverable bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send. To customize the message that should be send you need a palm with an SD/MMC card, then you create th ...

Collin Mulliner and Martin Herfurt

Blueprinting is a method to remotely find out details about bluetooth-enabled devices. Blueprinting can be used for generating statistics about manufacturers and models and to find out whether there are devices in range that have issues with Bluetooth sec ...

trifinite.group
Freeware

Blooover II is the successor of the very popular application Blooover. After 150000 downloads of Blooover, a new version of this mobile phone auditing toool is on its ready. Besides the BlueBug attack, Blooover II supports the HeloMoto attack (which is qu ...

Blooover II
Kali Linux
Freeware

Bluesnarfer will download the phonebook of any mobile device vulnerable to bluesnarfing.

Bluesnarfer
BullGuard Ltd.
Commercial

BullGuard Internet Security inspects your system prior to installation, removes any active malware and adapts to your system specifications. This process ends with a check to ensure the very latest virus definitions are installed. In no time, BullGuard is ...

BullGuard Internet Security
BizGuardian
Commercial

The BizGuardian Firewall provides the most reliable Unix Kernel (FreeBSD) customized in a highly secure, easy to install software appliance that can turn any old Pentium class computer into a high performance Firewall. The complexity of installing Unix, a ...

Blue Ridge Networks, Inc.
Commercial

The BorderGuard 6000 Secure Communications Platform builds on a decade-long legacy of offering the best combination of price, performance, reliability, and security in the industry.

Category VPN Servers