
Blue-Sec: The domain with the defensive scope.
​
Quad9
"An open DNS recursive service for free security and high privacy" 1
Non-Affiliate link: https://www.quad9.net/
1.1.1.1
"Unfortunately, by default, DNS is usually slow and insecure. Your ISP, and anyone else listening in on the Internet, can see every site you visit and every app you use — even if their content is encrypted. Creepily, some DNS providers sell data about your Internet activity or use it to target you with ads.
We think that’s gross. If you do too, now there’s an alternative: 1.1.1.1" 1
Non-Affiliate link: https://1.1.1.1/dns/
Acronis
"Actively protect your data, applications and systems from today’s advanced attacks. With Acronis Cyber Protect, you gain extended functionalities of Acronis Active Protection to protect your data in real-time with MI-based static and behavioral heuristic antivirus, anti-malware, anti-ransomware, and anti-cryptojacking technologies." 1
Non-Affiliate link: https://www.acronis.com/en-us/products/cyber-protect/security/
SentinelOne
"In the battle against ever-evolving cyber threats, we need to act faster and smarter than what’s possible with human-powered technology. SentinelOne is autonomous cybersecurity built for what’s next." 1
Non-Affiliate link: https://www.sentinelone.com/
Microsoft Defender for Endpoint
"Endpoint detection and response capabilities in Defender for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats." 1
Non-Affiliate link: Microsoft Defender for Endpoint
TODYL - EDR/NGAV
"Todyl's integrated Endpoint Security combines EDR and NGAV into a powerful, cloud-first solution. With Endpoint Security, you have detailed, real-time visibility into what's happening on the endpoints you manage. It stops attacks, accelerates detection, streamlines threat hunting, and enables immediate response actions." 1
Non-Affiliate link: https://www.todyl.com/endpoint-security
pfSense
"OPEN SOURCE SECURITY
Secure networks start here.™ With thousands of enterprises using pfSense® software, it is rapidly becoming the world's most trusted open source network security solution." 1
Non-Affiliate link: https://www.pfsense.org/
UniFi
"UniFi OS is a powerful and intuitive operating system enabling an end-to-end management experience for all of your IT needs. When paired with our specially designed hardware you will have unparalleled control over your network and WiFi, security cameras, VoIP phones, door access, smart enterprise lighting, digital signage, and much much more!" 1
​
"Threat Management is a feature found in the Firewall & Security section of your Network application that allows you to detect and block potentially harmful traffic to your network, as well as show notifications in the System Log section when the UniFi gateway encounters anything suspicious. This feature may also be referred to as Intrusion Detection System and Intrusion Prevention System or IDS/IPS."2
Non-Affiliate link: https://ui.com/us/consoles
ChatGPT
"We’ve trained a model called ChatGPT which interacts in a conversational way. The dialogue format makes it possible for ChatGPT to answer followup questions, admit its mistakes, challenge incorrect premises, and reject inappropriate requests." 1
Non-Affiliate link: https://openai.com/blog/chatgpt
Bing Chat
"With the new Bing built into the Microsoft Edge sidebar, you can ask complex questions, find comprehensive answers, get summarized information, find inspiration to build upon all in a side-by-side view, with no need to flip between tabs." 1
Non-Affiliate link: https://www.microsoft.com/en-us/edge/features/bing-chat?form=MT00D8
Bard
"Meet Bard: your creative and helpful collaborator, here to supercharge your imagination, boost your productivity, and bring your ideas to life.
Bard is an experiment and may give inaccurate or inappropriate responses. You can help make Bard better by leaving feedback." 1
Non-Affiliate link: https://bard.google.com/
Microsoft Security Copilot
"Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI—now in preview."1
VirusTotal
"Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community." 1
Non-Affiliate link: https://www.virustotal.com/
MalwareBazaar
"...the malware sample database of MalwareBazaar" 1
Non-Affiliate link: https://bazaar.abuse.ch/browse/
MalShare
"The MalShare Project is a collaborative effort to create a community driven public malware repository that works to build additional tools to benefit the security community at large." 1
Non-Affiliate link: https://malshare.com/
Talos
"Talos utilizes its extensive threat intelligence to make the internet safer for everyone. A variety of free software, services, resources and data are available to the public, including official rule sets and communities. Additionally, Talos promotes an informed security community, posting information on new threats and research on the Talos Blog, ThreatSource newsletter, social media, and on the Beers with Talos podcast, with new episodes posted biweekly." 1
Non-Affiliate link: https://talosintelligence.com/
AbuseIPDB
"AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.
Our mission is to help make Web safer by providing a central blacklist for webmasters, system administrators, and other interested parties to report and find IP addresses that have been associated with malicious activity online." 1
Non-Affiliate link: https://www.abuseipdb.com/
Valkyrie Comodo
"Valkyrie is a file verdict system. Different from traditional signature based malware detection techniques Valkyrie conducts several analysis using run-time behavior and hundreds of features from a file and based on analysis results can warn users against malware undetected by classic Anti-Virus products." 1
Non-Affiliate link: https://valkyrie.comodo.com/
OPSWAT
"Trust No File.
Trust No Device.
Simply submit suspicious files to MetaDefender Cloud for analysis. A comprehensive report is created to inform you about the contents of the file." 1
Non-Affiliate link: https://metadefender.opswat.com/
Microsoft Defender for Office 365
"Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect your organization against advanced threats to email and collaboration tools, like phishing, business email compromise, and malware attacks." 1
Non-Affiliate link: Microsoft Defender for Office 365
Perception Point
"Perception Point’s Advanced Email Security Solution is a next-gen email security software that prevents APTs, phishing, malware, ATO, impersonation, and BEC attacks with the speed, scale, and agility of the cloud." 1
Non-Affiliate link: https://perception-point.io/channel-coverage/email-security/
Dropbox Passwords
"Dropbox Passwords lets you seamlessly sign in to websites and apps by storing your passwords. The Passwords app remembers your usernames and passwords on all your devices—so you don’t have to." 1
Non-Affiliate link: https://www.dropbox.com/features/security/passwords
passbolt
"Security-first, open source password manager for teams & business." 1
Non-Affiliate link: https://www.passbolt.com/
Bitwarden
"Drive collaboration, boost productivity, and experience the power of open source with Bitwarden, the easiest way to secure all your passwords and sensitive information." 1
Non-Affiliate link: https://bitwarden.com/
NordPass
"NordPass — your digital life manager
Organize online life with NordPass — a secure solution for passwords, passkeys, credit cards, and more.
Generate strong passwords.
Securely share passwords with co-workers.
Find out if your data has been breached." 1
Non-Affiliate link: https://nordpass.com/
ESET:
ESET Protect MDR
"Continuous protection for your evolving IT environment, superior multiplatform cyber risk management and world-class 24/7 ESET expertise on call." 1
Non-Affiliate link: https://www.eset.com/au/business/mdr-protection/
SentinelOne: Vigilance Response
"Vigilance Respond augments security teams with 24/7/365 Managed Detection
& Response." 1
Non-Affiliate link: https://www.sentinelone.com/global-services/vigilance-respond/
Huntress
"Huntress delivers a powerful suite of managed endpoint detection and response (EDR) capabilities—backed by a team of 24/7 threat hunters—to protect your business from today’s determined cybercriminals." 1
Non-Affiliate link: https://www.huntress.com/
TODYL - MXDR
"Our MXDR services leverage an interactive, risk-focused methodology across the entire security lifecycle—from prevention to detection to response—to keep you one step ahead of the latest threats." 1
Non-Affiliate link: https://www.todyl.com/managed-extended-detection-response
Elastic Stack:
Kibana
"Run data analytics at speed and scale for observability, security, and search with Kibana. Powerful analysis on any data from any source, from threat intelligence to search analytics, logs to application monitoring, and much more." 1
Non-Affiliate link: https://www.elastic.co/kibana/
Splunk
"Fend off threat actors. Diminish downtime. Fix issues faster. Do it all with Splunk, the key to enterprise resilience." 1
Non-Affiliate link: https://www.splunk.com/
TheHive
"A scalable and collaborative Security Incident Response Platform, tightly integrated with MISP (Malware Information Sharing Platform), designed to make life easier for SOCs, CSIRTs, CERTs and any information security practitioner dealing with security incidents that need to be investigated and acted upon swiftly." 1
Non-Affiliate link: https://www.strangebee.com/thehive
Wazuh
"Wazuh unifies historically separate functions into a single agent and platform architecture. Protection is provided for public clouds, private clouds, and on-premise data centers."1
TODYL - SIEM
"Todyl's SIEM module is cloud-first, delivering a single pane of glass for comprehensive visibility. Ingest endpoint and network data from the Todyl Security Platform with a few clicks. Over 250 pre-built integrations enable ingestion from data sources across your environment, including endpoint, network, hardware, cloud services, and more. Data is analyzed using Todyl's powerful detection and analysis engine, delivering actionable insights for known and unknown threats." 1
Non-Affiliate link: https://www.todyl.com/security-information-event-management
Microsoft Authenticator App
"The Microsoft Authenticator app helps you sign in to your accounts when you're using two-step verification. Two-step verification helps you to use your accounts more securely because passwords can be forgotten, stolen, or compromised." 1
Non-Affiliate link: Microsoft Authenticator app
NordPass Authenticator
"NordPass Business’ built-in authenticator
Get time-based one-time passwords for two-factor authentication directly from NordPass business password manager." 1
Non-Affiliate link: https://nordpass.com/nordpass-authenticator/
';--have i been pwned?
"Check if your email or phone is in a data breach" 1
Non-Affiliate link: https://haveibeenpwned.com/
OutaboxED
"Unfortunately, if you see your name here then you have been outaboxed. You are at risk of having your identity stolen and becoming a victim of fraud and scams. Call the venue that allowed your data to be leaked and demand removal of Outabox systems." 1
Non-Affiliate link: https://haveibeenoutaboxed.com/
NOMORERANSOM
"The “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre, Kaspersky and McAfee with the goal to help victims of ransomware retrieve their encrypted data without having to pay the criminals." 1
Non-Affiliate link: https://www.nomoreransom.org/en/decryption-tools.html
TODYL - SASE
"Enabling Fast, Secure, and Reliable Connections
to All Your Resources from Everywhere" 1
Non-Affiliate link: https://www.todyl.com/secure-access-service-edge
Nessus
"Take advantage of the industry's most trusted vulnerability assessment solution to assess the modern attack surface. Extend beyond your traditional IT assets -- secure cloud infrastructure and gain visibility into your internet-connected attack surface." 1
Non-Affiliate link: https://www.tenable.com/products/nessus
Atera
Yes you heard right, Atera...
"Atera's Network Discovery lets you scan for open ports on your customers' networks so you can discover and take action on these security vulnerabilities." 1
Burp Suite:
Burp Sanner
"Burp Suite's web vulnerability scanner
Built on years of leading research, Burp Scanner finds the vulnerabilities you need to eliminate." 1
Non-Affiliate link: https://portswigger.net/burp/vulnerability-scanner
Nmap
Do I really need to explain. This is the good-ole manual approach.
Load your favorite Linux distro and get to port scanning with or without built-in scripts, leveraging SearchSploit or Exploit Database to find known vulnerabilities.
Non-Affiliate link: https://nmap.org/
ConnectSecure
"One complete tool for client protection and compliance.
Why use several tools when one will get the job done? Purpose-built in collaboration with MSPs, our intuitive, multi-tenant, all-in-one B2B cybersecurity platform was designed for your ease of use. Whether you aim to run a vulnerability assessment, conduct vulnerability remediation, or ensure regulatory compliance, here’s your opportunity to exceed client expectations." 1
Non-Affiliate link: https://connectsecure.com/
SecureStack
"Monitor All Your Web Applications From One Place
One dashboard to rule them all! Data from source code scans, vulnerability scans, credential scans, cloud misconfiguration analyses all go into one dashboard. Alerts are sorted by actual criticality for the target application, not by what some opinionated vulnerability database says...
​
Data from source code, cloud stack & application attack surface combined
SecureStack combines data from all three sources and prioritizes what you need to address first.
Then we help you fix it...
​
Hunt Threats You Never Could Before
Credentials, third party libraries, API keys and secrets, misconfigurations in AWS and Azure cloud resources. Gain visibility into all the public web assets for your organization, all from one tool."1
Detectify
"Complete External Attack Surface Management for AppSec & ProdSec teams
Start covering your external attack surface with rigorous discovery, 99.7% accurate vulnerability assessments, and accelerated remediation through actionable guidance, all from one complete standalone EASM platform."1
= FREE OPT
= LOW COST
= MED COST
= HIGH COST
= CLOUD
= ON-PREM
Terms or Use

