See what the world is building.
Browse new projects, startups, and apps — or check whether your idea already exists before you build it.
security
502 matchesLedger
Ledger Signers & Crypto Wallets — Go beyond exchanges and software wallets
Securitycrypto-wallethardware-walletcold-storageTrezor
Secure your crypto offline and unlock its full potential.
Securityhardware-walletcryptocurrencycold-storageForter
AI decisions for the future of commerce
Securityfraud-preventionpaymentsidentityThreema
Highly Secure Communication – Designed for Maximum Confidentiality
Securityend-to-end-encryptionprivacysecure-messagingArctic Wolf
AI in cybersecurity is hard. We make it easy.
Securitymanaged-soccybersecurityai-securityIntelligence X
Search engine and data archive for leaks, Tor, I2P, and more
Securityosintdata-leaksdark-webOSV - Open Source Vulnerabilities
An open, precise, and distributed approach to producing vulnerability information.
Securityvulnerability-databaseopen-sourcesecurity-scanningVaronis
AI runs on data. Varonis keeps it secure.
Securitydata-securityai-securitycloud-securityPanorays
Third-Party Cyber Risk. Solved.
Securitythird-party-riskvendor-risk-managementattack-surfaceCyera
Protect your data. Secure AI.
Securitydata-securityai-securitycloud-securitySecurityScorecard
Securing the world's supply chains with threat-informed TPRM.
Securitythird-party-risksupply-chain-securityvendor-risk-managementUpGuard
The #1 Cyber Risk Posture Management Software Platform
Securitycyber-riskvendor-risk-managementattack-surface-managementBitsight
AI-powered intelligence that outsmarts cyber risk
Securitycyber-riskthird-party-risksecurity-ratingsZeroFox
Real intelligence to discover, validate, and disrupt threats at scale.
Securitycyber-threat-intelligencedark-web-monitoringbrand-protectionSpyCloud
Identity Threat Protection Powered by Recaptured Dark Web Data
Securityidentity-protectiondark-webaccount-takeoverFlare
Cut off attacks at the source with automated Threat Exposure Management
Securitythreat-intelligencedark-webcredential-monitoringGreenbone
Schützen Sie Ihre IT-Infrastruktur vor Hackern und Schadcode
Securityvulnerability-managementopen-sourceopenvasDNSFilter
DNS security and content filtering for every need
Securitydns-filteringnetwork-securitycontent-filteringScamAdviser
Check any website for scams and fraud in seconds
Securityscam-detectionwebsite-checkerfraud-preventionArkime
Large scale, full packet capturing, indexing, and database system
Securitypacket-capturenetwork-analysisopen-sourceCisco Talos Intelligence Group
Comprehensive threat intelligence powering Cisco's global cyber defense
Securitythreat-intelligencecybersecurityvulnerability-researchPhishTank
Join the fight against phishing
SecurityphishingcybersecuritycommunityDeHashed
Free deep-web scans and protection against credential leaks.
Securitybreach-detectioncredential-leakosintVeza
Reveal, Visualize, and Secure Your Identity Entitlements Everywhere
Securityidentity-securityaccess-governanceleast-privilegeVenafi (CyberArk Machine Identity Security)
Secure certificates and PKI for comprehensive machine identity security.
Securitymachine-identitypkitls-certificatesDigiCert
Securityssl-certificatespkitlsKeyfactor
Trust Infrastructure for AI & Machines
Securitypkicertificate-managementmachine-identityLumos
The first autonomous identity platform to eliminate sprawl and identity fatigue.
Securityidentity-governanceaccess-managementiamConductorOne
Access for the agentic era — identity security at AI scale.
Securityidentity-securityaccess-managementjust-in-time-provisioningPicus Security
Expose Which Attacks Can Breach Your Defenses
Securitysecurity-validationbreach-and-attack-simulationvulnerability-managementStrongDM
Least privilege access, maximum security.
Securityzero-trustprivileged-access-managementinfrastructure-securityOpal Security
The programmable access platform that closes the gap between policy intent and enforcement.
Securityidentity-access-managementjust-in-time-accessleast-privilegePomerium
Clientless, secure connections to your applications without a VPN
Securityzero-trustidentity-aware-proxyvpn-alternativeCymulate
Validate Threats. Build Exposure-Informed Defenses.
Securitybreach-and-attack-simulationthreat-exposure-managementsecurity-validationHorizon3.ai
Security you can prove. Get continuous clarity into your threat risk and exposure.
Securitypenetration-testingautonomous-securityvulnerability-managementSafeBreach
The leading exposure validation platform combining breach and attack simulation.
Securitybreach-and-attack-simulationexposure-validationattack-pathAttackIQ
Proactive Security Validation & Exposure Management for cyber defenses
Securitybreach-and-attack-simulationsecurity-validationmitre-attckPentera
Validate your security controls with AI to fix what's exploitable
Securitypenetration-testingexposure-validationautomated-pentestingIntruder
Unified, always-on exposure management for lean security teams.
Securityvulnerability-managementattack-surface-managementcloud-securityProbely
Discover and Test the Security of all your APIs and Web Apps
Securitydastvulnerability-scannerapi-security42Crunch
Automate API Security across Agentic Workflows
Securityapi-securityagentic-airuntime-protectionStackHawk
Reimagining AppSec for the AI Era
Securitydastappsecapi-securityAkto
Turn AI chaos into control with enterprise-grade AI agent security.
Securityai-securityai-agentsmcpKubescape
Open-source Kubernetes Security: Practical, End-to-End Coverage
Securitykubernetesopen-sourcesecurity-scanningDeepfence
Securitysecuritycloud-securityopen-sourceTruffleHog
Uncovers exposed non-human identities and secrets, making remediation easier.
Securitysecrets-detectioncredential-scanningopen-sourceAikido Security
Secure everything, Compromise nothing.
SecuritysastscadevsecopsNightfall
Stop data leaks to AI—and everywhere else
Securitydata-loss-preventiondlpai-securityBearer
Developer-first SAST for security and privacy
Securitysastdevsecopsstatic-analysisJit
AI Agents that execute product security from detection to remediation.
Securityproduct-securityai-agentsdevsecops















































