See what the world is building.
Browse new projects, startups, and apps — or check whether your idea already exists before you build it.
security · launched
481 matchesCybereason
AI-Driven XDR Platform for detection, response, and cyber resilience
Securityxdredrendpoint-protectionDeep Instinct
Prevent malware, ransomware, and AI-generated attacks everywhere your data exists
Securitycybersecuritydeep-learningmalware-preventionHuntress
Enterprise-grade cybersecurity for ALL businesses, wrecking hackers 24/7.
Securityedrmanaged-securitysocThreatLocker
Meet the world's leading Zero Trust cybersecurity platform.
Securityzero-trustendpoint-securityransomware-protectionAction1
Unified cross-platform patch management that just works.
Securitypatch-managementendpoint-managementvulnerability-managementHexnode
The complete platform for UEM and XDR
Securityuemendpoint-managementmdmLansweeper
AI for Total Asset Visibility for Every IT and Security Decision
Securityasset-managementcyber-asset-intelligenceit-securityrunZero
See & secure your total attack surface.
Securityexposure-managementattack-surfaceasset-discoveryNozomi Networks
We Protect the Toughest OT & IoT Environments
Securityot-securityiot-securityindustrial-cybersecurityDragos
Your Partner in OT Cybersecurity
Securityot-securityindustrial-cybersecuritycritical-infrastructureClaroty
Secure Your Cyber-Physical Systems Across the XIoT
Securitycyber-physical-systemsot-securityiot-securityIllumio
Breaches are Inevitable. Disasters are Optional.
Securitymicrosegmentationbreach-containmentzero-trustSilverfort
All identities. One platform. Complete protection from legacy to cloud.
Securityidentity-securityiamzero-trustHYPR
End-to-end identity security with passwordless authentication and identity verification
Securitypasswordless-authenticationidentity-verificationmfaBeyond Identity
The Only Platform Built to Eliminate Identity-Based Attacks
Securitymfapasswordlessidentity-securityTransmit Security
Redefining Identity and Fraud Detection in the Age of Agentic AI
Securityidentity-managementfraud-detectionciamHanko
Modern Authentication. On Your Terms.
Securityauthenticationpasskeysopen-sourceOry
Composable, scalable, transparent IAM for agents, customers, and B2B
Securityidentityaccess-managementauthenticationFusionAuth
The only CIAM platform built to deploy anywhere with total control
Securityauthenticationidentity-managementciamDescope
Identity journeys for customers and AI agents
SecurityidentityauthenticationciamWorkOS
Your app, Enterprise Ready.
SecurityssoenterpriseauthenticationFrontegg
The Identity Layer for Every SaaS Entry Point
SecurityciamauthenticationauthorizationStytch
The identity platform for humans & AI agents
SecurityauthenticationidentityauthorizationClerk
The easiest way to add authentication and user management to your application.
Securityauthenticationuser-managementreactPing Identity
Identity Security for the Digital Enterprise
Securityidentity-managementaccess-managementssoSailPoint
One platform to secure every identity for humans, machines, and AI
Securityidentity-securityaccess-governanceigaSaviynt
AI-Based Identity Security and Access Management Platform Solutions
Securityidentity-securityaccess-managementiamAkeyless
Identity Security for Machines, AI Agents & Humans
Securitysecrets-managementidentity-securityzero-knowledgeBleepingComputer
Cybersecurity, Technology News and Support for over 20 years
SecuritycybersecuritynewsmalwareMITRE ATT&CK
Adversarial Tactics, Techniques, and Common Knowledge framework for cyber threats
Securitythreat-intelligencecybersecurityattack-frameworkIntel 471
Empower your business with cyber intelligence-driven solutions
Securitycyber-threat-intelligencethreat-huntingattack-surface-managementThe Hacker News
#1 Trusted Source for Cybersecurity News
Securitycybersecuritythreat-intelligenceinfosecMaltego
From data to intelligence - in minutes.
Securityosintcyber-investigationsthreat-intelligenceurlscan.io
Website scanner for suspicious and malicious URLs
Securityurl-scannerphishing-detectionthreat-intelligenceExploit Database
Exploits for Penetration Testers, Researchers, and Ethical Hackers
Securityexploitspenetration-testingvulnerability-researchVulnHub
Vulnerable By Design — gain hands-on digital security experience
Securitycybersecuritypenetration-testingctfHack The Box
Cyber Mastery: Community Inspired. Enterprise Trusted.
SecuritycybersecuritytrainingctfPentesterLab
Build Expertise in Advanced Web Hacking and Security Code Review
Securityweb-securitypenetration-testingcode-reviewBishop Fox
The leading authority in offensive security since 2005
Securitypenetration-testingred-teamoffensive-securityOffSec
Cybersecurity skills that matter — train in live labs, hack real environments.
Securitycybersecuritypenetration-testingcertificationsCheck Point SASE
10x Faster Secure Internet Access for Enterprise Networks
Securitysasezero-trustnetwork-securityTails
A portable operating system that protects against surveillance and censorship.
SecurityprivacyanonymitytorTwingate
Identity-based access for users, services, and AI agents
Securityzero-trustvpn-replacementnetwork-accessKeePassXC
Cross-platform password manager that safely stores and auto-fills passwords.
Securitypassword-manageropen-sourceencryptionVeraCrypt
Free open source disk encryption with strong security for the Paranoid
Securitydisk-encryptionopen-sourceprivacyGnuPG
Reconquer your privacy
Securityencryptionpgpopen-sourceOpenSSL
Security and privacy tools as a fundamental human right.
SecuritycryptographyssltlsAvast
Award-winning free antivirus, online scam protection, privacy tools and more.
SecurityantiviruscybersecurityvpnSuricata
Observe. Protect. Adapt.
Securitynetwork-securityintrusion-detectionthreat-detectionESET
AI-Native Prevention for Tomorrow's Threats
Securityantivirusendpoint-protectioncybersecurity

















































