BrioList — AI tools discovery and rankings
BrioList
Discover Websites & AI tools • Vote • Rank • Auto-synced
HomeExploreRankings❤️ My FavoritesBlog
Submit Tool
© 2026 BrioListwww.briolist.com
AboutPrivacyTermsContact

Explore AI Tools

Discover the next generation of AI — search, filter, and vote.

Active filters: clear all
All✦Productivity✦Education✦Generators✦Voice✦Dev✦CRM✦SEO✦Analytics✦Text✦Security✦Generators✦Support
PricingFreeFreemiumPaid
TagsPrivate SearchAnonymous BrowsingOnline SecurityVPNPrivate BrowsingRemote AccessDevice Management
Categories
All Tools✦⚡ Productivity✦🎓 Education✦🎥 Video Generators✦🎵 Audio & Voice✦💻 Coding & Dev✦💼 Sales & CRM✦📈 Marketing & SEO
Cybersecurity
phishing protection
security analytics
machine learning
threat intelligence
✦📊 Data & Analytics
✦📝 Copywriting & Text
✦🔒 Security
✦🖼️ Image Generators
✦🤖 Chatbots & Support
Pricing
AllFreeFreemiumPaid
Showing 24 results
Tip: vote on Tool details to boost its pulse score.

CrowdSec

CrowdSec is an innovative, open-source security solution that leverages collective intelligence to protect against cyber threats. This collaborative platform uses behavior analysis and machine learning to detect and block malicious activities across a global network of users. By sharing real-time threat information, CrowdSec creates a powerful defense system that adapts to new threats quickly, providing robust protection against a wide range of cyber attacks, from brute force attempts to sophisticated botnets.

Score
Good
collaborative securitythreat detectionbehavior analysis
WebsiteView →

Exploit-DB

Exploit-DB is the largest public database of exploits and vulnerability information, serving as an essential resource for cybersecurity researchers, penetration testers, and system administrators. This comprehensive platform provides detailed information on known vulnerabilities, along with proof-of-concept exploits and security advisories. By maintaining an extensive collection of exploits and security-related resources, Exploit-DB plays a crucial role in vulnerability research and responsible disclosure practices.

Score
Good
exploit databasevulnerability researchsecurity advisories
WebsiteView →

InQuest

InQuest is a leading threat detection and response platform that specializes in advanced malware analysis and email security. This powerful solution helps organizations protect against sophisticated email-borne threats, including zero-day attacks, fileless malware, and advanced persistent threats. By combining deep content inspection with machine learning and threat intelligence, InQuest provides comprehensive protection against evolving cyber threats in email and other digital communication channels.

Score
Good
malware analysisemail securitythreat detection
WebsiteView →

AlienVault OTX

AlienVault Open Threat Exchange (OTX) is a collaborative threat intelligence platform that enables security professionals to share and access real-time threat data from around the world. This community-driven platform provides valuable insights into emerging threats, malicious IPs, domains, and malware indicators. By leveraging the collective knowledge of security researchers and organizations, OTX helps defenders stay ahead of evolving cyber threats and improve their security posture.

Score
Good
threat intelligencecybersecurity communitymalware analysis
WebsiteView →

Bugcrowd

Bugcrowd is a cutting-edge platform that harnesses the power of crowdsourced security testing to help organizations identify and fix vulnerabilities in their digital assets. By tapping into a global community of skilled security testers, Bugcrowd enables businesses to uncover hidden weaknesses and strengthen their defenses against cyber threats. With its innovative approach to security testing, Bugcrowd is revolutionizing the way organizations approach vulnerability management and incident response. Bugcrowd's platform is particularly useful for organizations looking to augment their internal security testing capabilities, as it provides access to a vast pool of skilled testers who can simulate real-world attacks and identify vulnerabilities that might have gone unnoticed. By leveraging Bugcrowd's crowdsourced security testing, organizations can reduce the risk of cyber attacks, improve their overall security posture, and ensure the integrity of their digital assets. Whether you're a startup or a Fortune 500 company, Bugcrowd's platform can help you stay ahead of emerging threats and protect your business from cyber threats.

Score
Good
crowdsourced security testingvulnerability managementpenetration testing
WebsiteView →

IntelliShield

IntelliShield is a powerful threat intelligence platform that provides organizations with actionable insights and timely alerts on emerging cyber threats. By leveraging advanced analytics and machine learning algorithms, IntelliShield enables businesses to stay ahead of malicious activities and protect their digital assets from sophisticated attacks. With its comprehensive threat intelligence capabilities, IntelliShield is an essential tool for organizations seeking to enhance their cybersecurity posture and reduce the risk of cyber attacks. IntelliShield's platform is particularly useful for organizations looking to improve their incident response capabilities, as it provides real-time intelligence on emerging threats and enables businesses to respond quickly and effectively to security incidents. By leveraging IntelliShield's threat intelligence, organizations can strengthen their defenses, reduce the risk of cyber attacks, and ensure the continuity of their operations. Whether you're a small business or a large enterprise, IntelliShield's platform can help you navigate the complex landscape of cybersecurity and stay protected against evolving threats.

Score
Good
threat intelligencecybersecurityincident response
WebsiteView →

CISA

The Cybersecurity and Infrastructure Security Agency (CISA) is a vital tool for ensuring the security and resilience of the nation's critical infrastructure. By providing timely and comprehensive information on potential cyber threats, CISA enables organizations to take proactive measures to protect themselves against malicious activities. With its extensive resources and expert guidance, CISA is an indispensable asset for businesses and individuals seeking to safeguard their digital assets and stay ahead of emerging threats. CISA's services are particularly useful for organizations looking to enhance their cybersecurity posture, as they offer a wealth of information on best practices, threat intelligence, and mitigation strategies. By leveraging CISA's expertise, organizations can strengthen their defenses, reduce the risk of cyber attacks, and ensure the continuity of their operations. Whether you're a small business or a large enterprise, CISA's resources and guidance can help you navigate the complex landscape of cybersecurity and stay protected against evolving threats.

Score
Good
cybersecuritythreat intelligencecritical infrastructure
WebsiteView →

CircleCI

CircleCI is a modern continuous integration and continuous deployment platform that helps teams deliver software faster and more efficiently. It provides a robust and scalable platform for automating the build, test, and deployment of code, making it an ideal choice for teams of all sizes. With CircleCI, developers can automate repetitive tasks, reduce manual errors, and focus on writing high-quality code. CircleCI also provides a wide range of features, including support for multiple programming languages, real-time workflow monitoring, and collaboration tools for teams. By using CircleCI, teams can improve their software delivery workflow, reduce deployment times, and increase productivity. Additionally, CircleCI provides a secure and reliable platform for managing workflows, making it an ideal choice for teams who require high levels of security and compliance. CircleCI is also highly customizable, allowing teams to tailor their workflows to their specific needs.

Score
Good
Continuous IntegrationContinuous DeploymentCloud Computing
WebsiteView →

Travis CI

Travis CI is a popular continuous integration platform that helps teams automate the build, test, and deployment of their code. It provides a simple and intuitive interface for creating and managing workflows, making it an ideal choice for teams of all sizes. With Travis CI, developers can automate repetitive tasks, reduce manual errors, and focus on writing high-quality code. Travis CI also provides a wide range of features, including support for multiple programming languages, real-time workflow monitoring, and collaboration tools for teams. By using Travis CI, teams can improve their software delivery workflow, reduce deployment times, and increase productivity. Additionally, Travis CI provides a secure and reliable platform for managing workflows, making it an ideal choice for teams who require high levels of security and compliance. Travis CI is also highly customizable, allowing teams to tailor their workflows to their specific needs. It also provides a large community of developers who contribute to its ecosystem, making it an ideal choice for teams looking for support and guidance.

Score
Good
Continuous IntegrationContinuous DeploymentOpen Source
WebsiteView →

GitLab CI/CD

GitLab CI/CD is a powerful tool for automating software delivery workflows. It provides a seamless and integrated platform for creating and managing workflows, making it an ideal choice for teams of all sizes. With GitLab CI/CD, developers can automate repetitive tasks, reduce manual errors, and focus on writing high-quality code. GitLab CI/CD also provides a wide range of features, including support for multiple programming languages, real-time workflow monitoring, and collaboration tools for teams. By using GitLab CI/CD, teams can improve their software delivery workflow, reduce deployment times, and increase productivity. Additionally, GitLab CI/CD provides a secure and reliable platform for managing workflows, making it an ideal choice for teams who require high levels of security and compliance. GitLab CI/CD is also highly customizable, allowing teams to tailor their workflows to their specific needs. It also provides a large community of developers who contribute to its ecosystem, making it an ideal choice for teams looking for support and guidance.

Score
Good
Continuous IntegrationContinuous DeploymentDevOps
WebsiteView →

Kaspersky Threat Intelligence

Kaspersky Threat Intelligence is a vital tool for cybersecurity professionals, providing them with the insights and expertise needed to stay ahead of emerging threats. By leveraging its extensive database of threat intelligence, this platform enables users to identify and mitigate potential security risks, ensuring the protection of their organization's assets and data. With Kaspersky Threat Intelligence, users can gain a deeper understanding of the threat landscape, allowing them to make informed decisions about their security posture and develop effective strategies to combat cyber threats.

Score
Good
Threat IntelligenceCyber SecurityRisk Management
WebsiteView →

MX Toolbox

MX Toolbox is a suite of tools for diagnosing and troubleshooting email delivery issues. This platform is useful for system administrators and email marketers who want to identify and fix issues with their email servers. MX Toolbox provides a range of features, including a DNS lookup tool, a email delivery test, and a blacklist checker, making it an ideal tool for anyone who works with email. Whether you're trying to diagnose a delivery issue or prevent spam, MX Toolbox is a great resource for email troubleshooting and optimization.

Score
Good
Email DeliveryDNS LookupBlacklist Checker
WebsiteView →

DUO

DUO is a multi-factor authentication platform that provides an additional layer of security to protect against cyber threats. By requiring a second form of verification, such as a code sent to a phone or a biometric scan, DUO helps to prevent unauthorized access to sensitive information and systems. This is particularly useful for businesses and organizations that handle sensitive data, as it provides an extra layer of protection against phishing and other types of cyber attacks. With DUO, users can rest assured that their data is safe and secure, and that they are protected against the latest threats.

Score
Good
Multi-Factor AuthenticationCyber SecurityIdentity Verification
WebsiteView →

Qubes OS

Qubes OS is a security-focused operating system that provides users with a secure and private way to browse the internet, shielding their online activity from prying eyes and hackers. It is useful for individuals looking to protect their online security and privacy, and browse the internet with confidence. With Qubes OS, users can create a secure and isolated environment, protecting their data from interception and surveillance. This is particularly important in today's digital landscape, where online security and privacy are increasingly under threat. By using Qubes OS, users can browse the internet safely and securely, knowing that their data is protected by state-of-the-art security features and isolation techniques. Whether at home, in the office, or on the go, Qubes OS provides a reliable and secure way to stay connected and protected online. Qubes OS also provides a high level of customization and flexibility, allowing users to tailor their operating system to their specific needs and requirements.

Score
Good
Operating systemSecurityIsolation
WebsiteView →

NoScript

NoScript is a browser extension that blocks JavaScript and other potentially malicious scripts, providing users with an additional layer of security and protection against online threats. It is useful for individuals looking to protect themselves against malware, phishing, and other online attacks. With NoScript, users can block scripts from running on their browser, preventing malicious actors from exploiting vulnerabilities and stealing sensitive data. This is particularly important in today's digital landscape, where online threats are increasingly sophisticated and prevalent. By using NoScript, users can boost their online security and prevent unwanted content from appearing on their screens. Whether at home or on the go, NoScript provides a simple and effective way to stay safe online.

Score
Good
Script blockerBrowser extensionSecurity
WebsiteView →

Veracode

Veracode is particularly useful for companies that want to develop secure software applications and prevent potential vulnerabilities. By leveraging Veracode's products and services, organizations can gain valuable insights into their software security posture and take corrective action to prevent potential breaches or data losses. Whether you're a small business or a large enterprise, Veracode is a valuable resource for anyone looking to enhance their application security.

Score
Good
application securitysoftware securityvulnerability assessment
WebsiteView →

HackerOne

HackerOne is particularly useful for companies that want to proactively identify and address security vulnerabilities in their products or services. By leveraging HackerOne's platform and community of security experts, organizations can gain valuable insights into their security posture and take corrective action to prevent potential breaches. Whether you're a startup or a large enterprise, HackerOne is a valuable resource for anyone looking to enhance their cybersecurity.

Score
Good
bug bounty programsvulnerability disclosurepenetration testing
WebsiteView →

Fortinet

Fortinet is particularly useful for companies that want to develop a robust cybersecurity strategy and implement effective security controls. By leveraging Fortinet's products and services, organizations can gain valuable insights into the cyber threat landscape and take proactive measures to prevent potential breaches or data losses. Whether you're a small business or a large enterprise, Fortinet is a valuable resource for anyone looking to enhance their cybersecurity.

Score
Good
network securitycloud securitythreat intelligence
WebsiteView →

MITRE ATT&CK

MITRE ATT&CK is particularly useful for organizations that want to develop a deeper understanding of the cyber threat landscape and improve their threat detection and response capabilities. By leveraging MITRE ATT&CK's framework and community resources, businesses can gain valuable insights into the tactics and techniques used by threat actors and develop more effective cybersecurity strategies. Whether you're a small business or a large enterprise, MITRE ATT&CK is a valuable resource for anyone looking to enhance their cybersecurity.

Score
Good
cyber threat intelligencethreat detectionincident response
WebsiteView →

SecurityScorecard

SecurityScorecard is particularly useful for companies that want to assess their own security posture or evaluate the cybersecurity risks associated with third-party vendors or partners. By leveraging SecurityScorecard's expertise and technology, organizations can gain a deeper understanding of their cybersecurity risks and make informed decisions to improve their overall security posture. Whether you're a small business or a large enterprise, SecurityScorecard is a valuable resource for anyone looking to enhance their cybersecurity.

Score
Good
cybersecurity risk assessmentvendor risk managementsecurity monitoring
WebsiteView →

Symantec

Symantec is particularly useful for companies that want to develop a robust cybersecurity strategy and implement effective security controls. By leveraging Symantec's products and services, organizations can gain valuable insights into the cyber threat landscape and take proactive measures to prevent potential breaches or data losses. Whether you're a small business or a large enterprise, Symantec is a valuable resource for anyone looking to enhance their cybersecurity.

Score
Good
endpoint securityemail securitythreat intelligence
WebsiteView →

AWS Security

AWS Security is a broad set of security services and features designed to protect your AWS resources and data. With a strong focus on security, identity and compliance, AWS Security provides a robust set of tools to help you secure your cloud environment. From data encryption and key management to threat detection and incident response, AWS Security offers a comprehensive suite of services to help you protect your cloud-based applications and data. By integrating artificial intelligence and machine learning into its security services, AWS Security enables you to detect and respond to security incidents in real-time, ensuring the integrity and availability of your cloud resources.

Score
Good
Cloud SecurityComplianceIdentity and Access Management
WebsiteView →

Kaspersky

Kaspersky's AI-driven approach enables it to stay ahead of emerging threats, providing users with unparalleled protection and peace of mind. Its user-friendly interface and seamless integration with various devices and platforms make it an ideal choice for individuals and businesses seeking robust cybersecurity solutions.

Score
Good
AntivirusCyber ThreatsOnline Security
WebsiteView →

CVE Details

CVE Details offers a range of features and tools that enable organizations to assess and manage vulnerabilities, including advanced search and filtering capabilities, detailed vulnerability descriptions, and prioritization tools. Its user-friendly interface and seamless integration with popular security tools make it an ideal choice for businesses seeking to enhance their cybersecurity posture.

Score
Good
Vulnerability DatabaseCyber ThreatsSecurity Research
WebsiteView →
← Previous PageNext Page →