โผ Popular
Cybersecurity
Free mode
100% free
Freemium
Free Trial
Featured matches
-
AI-powered identity verification for trust. 15% offOpen
Federica Sorrentino๐ 72 karmaFeb 5, 2025@Veriff - Identity Verification and KYCExcellent in accuracy, security, it's a leading choice in it's field -

-
Prevent AI data breaches with real-time risk management.Open
Not just alerts - real time visibility for Slack, Google Workspace, and AI APIs to stop risks before they become breaches -
Find Your Ideal IT Career Path in Minutes - Backed by PsychologyOpen

-
in an era with AI benefit and AI horror stories both saturating, Charley is one of the few that seem to grasp the first principles of security. I spend my days researching quantum resistant encryption and advising on IAM challenges. The true weakest link is also that factors are not phishing resistant. On-device prevention of social engineering is by far the most valuable and efficient defense layer. Excited to see Agent Charley in action -

Other tools
-
Easy-to-use, but poor quality for German pronounciation. Much better in English, therefore 3 stars.
-
any plans to have it available for Android or PC anytime soon? can't find any such info on the website :(
-
Open
-
Really impressed with CodeThreat! Itโs great to have a free tool that detects both code vulnerabilities and library risks. The setup was smooth, and it fits well into CI/CD pipelines. Definitely worth checking out!
- Spotlight: Notis (Personal assistant)
- Didn't find the AI you were looking for?
-
-
Empowering Organizations to Achieve Compliance ReadinessOpenI used this tool today and loved how simple and insightful it was!
-
Secuarden is your LLM-powered, context-aware security co-pilot for code reviews.Open -
GPT-powered security questionnaire automation with unmatched precision.Open
-
ZeroThreat has been a true game-changer for our team. As someone who cares deeply about keeping our retail platform secure, I love how ZeroThreat quietly works behind the scenes, spotting and blocking threats before they become issuesโwithout requiring constant monitoring or technical know-how. The alerts are simple to understand, actionable, and extremely reliableโno more chasing false alarms. Since integrating ZeroThreat, we've seen a noticeable drop in suspicious activity, and I wake up each day knowing our APIs are well-protected. It makes security effortless and gives our whole team peace of mind.
-
AI-powered industrial monitoring for real-time optimization.Open -
Transform business concepts into stunning visual silhouettes.Open -
Open -
Open -
Open -
Fortifying networks against cyber threats.Open -
Thorough threat modelling for system design and review.Open
-
Unearth software vulnerabilities with AI understanding.Open -
Dual-role AI discussion bot with programming assistance.Open -
Automated cyber threat intelligence by Bob Gourley.Open -
Protect yourself with the best free antivirus software.Open -
Expert in analyzing vulnerabilities with ransomware focus.Open
-
A bot providing detailed cybersecurity threat intelligence.Open -
Open -
Securing WordPress, managing malware cleanup service.Open -
Specialized Cybersecurity Analyst in the NIST Framework.Open -
Open -
Generating audit and penetration test specifications.Open -
Leading global cybersecurity strategies, managing cyber risks, and overseeing information governance.Open -
Best Tools, Techniques and Tactics for Tracking Down Cyber Criminals.Open -
Advanced cybersecurity strategy and insight specialistOpen
-
Guidance on offensive security and pentesting.Open -
Empowering organizations in enhancing their cybersecurity defenses.Open -
Feed me any input, I'll match it with relevant MITRE ATT&CK techniques and tactics.Open -
Serving quick cybersecurity solutions and protective strategies.Open -
Ace tech interviews with realistic mock sessions and feedback.Open -
Open
-
Assists in identifying and mitigating security threats.Open -
Open -
Expert in Advanced Cyber Threat Analysis with Collaborative ToolsOpen -
Expert in cybersecurity at KingLand, passionate about cryptography.Open -
Cybersecurity expertise with a focus on current threat intelligence.Open -
Expert in answering Web3 Privacy and Data Security Law queries.Open -
Open -
Open -
Open -
Open -
Open -
Open -
Classify and understand MITRE ATT&CK Framework terms.Open -
Your guide to starting and advancing in cybersecurity careers.Open -
Expert cybersecurity for software development.Open -
I'll help you write cybersecurity requirements!Open -
Personalized Cybersecurity book and blog recommendationsOpen -
Focused writing on cybersecurity, resilience, and global communication.Open -
AI advisor for tech resilience, balancing strategy and technicalityOpen -
Web3 security auditor for smart contract analysis and report generation.Open -
Expert in CVEs and cybersecurity vulnerabilities, providing precise information.Open -
Your AI expert in cyber security training.Open -
Guides on E2EE system implementation and security features for password managers.Open -
Delivering daily, sector-specific cybersecurity intelligence.Open -
Cybersecurity assistant for personal safety tips and setups.Open -
Open -
Guide on AI implementation for secure dataOpen -
Uncomplicated, accessible digital security advisor.Open -
Managing and optimizing your cloud resources.Open -
-
Open -
Open -
A friendly cybersecurity coach offering practical privacy tips.Open -
Identifying and mitigating threats for any system.Open -
Open -
Your partner for penetration testing and vulnerability assessment.Open -
Master Microsoft's Defender for Endpoint with tailored guidance.Open -
Open -
Expert in crafting cybersecurity announcementsOpen -
Advises on managing technology risks to safeguard organization.Open
Post

