AI Tools

Search and filter curated AI tools. Find the right tool for your task.

GuardianLog

Checked 3h agoDead linkPro

GuardianLog centralizes security logs from dozens of sources into a queryable archive with retention policies that satisfy compliance auditors. The platform compresses historical data without sacrificing search speed for investigation. Automated compliance reporting pulls evidence from your log lake to build audit-ready documents for SOC2, PCI, and HIPAA. Teams use SQL-like syntax to hunt for indicators across months of data. The system is designed for organizations that treat logs as a permanent asset, not a burden.

IncidentChain

Checked 3h agoDead linkPro

IncidentChain provides a unified workspace for incident response, from alert triage to post-incident review. Responders add notes, assign tasks, and attach evidence to incidents with full audit trails. Automated runbooks guide teams through containment steps specific to each threat type. Escalation policies ensure critical incidents reach on-call analysts in seconds. Post-incident templates and timeline exports streamline your security review process.

MalwareScope

Checked 3h agoDead linkPro

MalwareScope detonates suspicious files in isolated sandbox environments to analyze execution behavior and payload delivery. The platform generates detailed reports showing system calls, network connections, and registry modifications. Analysts use behavior signatures to detect malware variants and unknown families. The tool integrates with email gateways and file repositories to sample suspicious content automatically. SOCs use MalwareScope to quickly validate whether a file is malicious or safe.

NetGlass

Checked 3h agoLink OKEnterprise

NetGlass provides real-time network traffic visibility and threat detection for internal networks and hybrid cloud environments. The platform reconstructs application-level connections from encrypted traffic patterns without decrypting packets. Analysts hunt for C2 callbacks and data exfiltration using behavioral detection rules. The system integrates with Suricata and Zeek for open-source-native teams. Network teams and security analysts collaborate using NetGlass to detect sophisticated lateral movement.

PhishCatcher

Checked 3h agoDead linkPro

PhishCatcher uses natural language processing and link analysis to detect phishing emails before they reach user inboxes. The system learns from reported phishing feedback to improve detection rules. URLs are detonated in sandboxes to confirm malicious intent. The platform integrates with email gateways to quarantine high-confidence phishing. Security awareness teams use PhishCatcher to reduce successful phishing attacks by over 80 percent.

PolicyKeeper

Checked 3h agoDead linkPro

PolicyKeeper enforces security policies across cloud infrastructure and on-premises systems with configurable rules. The platform monitors for policy drift and automatically remediates common misconfigurations without manual intervention. Audit logs capture all enforcement actions for compliance reporting. Teams define policies using simple YAML, making it accessible to both security and operations staff. The system supports multi-cloud environments and custom compliance frameworks.

ResponseBot

Checked 3h agoLink OKPro

ResponseBot automates response actions based on alert rules, including isolation, quarantine, and automated hunting. Security teams define response playbooks without coding using a visual workflow builder. The system can pause, review, and escalate before executing destructive actions. Audit logs show every automated response for compliance and post-incident review. ResponseBot reduces mean time to containment from hours to minutes.

RiskCalc

Checked 3h agoDead linkPro

RiskCalc assigns quantified risk scores to findings, vulnerabilities, and misconfigurations across your entire security landscape. The scoring engine weights exploitability, blast radius, and business criticality to help teams prioritize work. Executive dashboards show risk trends over time to justify security spending. The platform integrates with ticketing systems to automate remediation workflows. CISOs use RiskCalc to translate technical findings into business language for leadership.

SentrySphere

Checked 3h agoDead linkEnterprise

SentrySphere is a cloud-native SOC platform built for mid-market security teams. It ingests logs from endpoints, cloud accounts, and identity providers into a unified detection graph. Analysts use natural language to tune alert rules, shipping new detections in minutes without code. A guided investigation view walks junior analysts through triage steps with linked evidence and playbook triggers. The platform is trusted by B2B SaaS companies that need 24/7 monitoring without large in-house staffing.

StealthHunt

Checked 3h agoDead linkEnterprise

StealthHunt is a threat hunting platform that surfaces hidden indicators of compromise using statistical anomaly detection. Analysts build hunting hypotheses and the platform executes queries across all collected logs. Results are ranked by confidence and presented with contextual evidence. Custom analytics let teams define novel detection rules based on your environment. Proactive threat hunters use StealthHunt to discover attacks before automated alerts fire.

ThreatIntel

Checked 3h agoLink OKEnterprise

ThreatIntel is a managed threat intelligence service that provides IOCs, malware samples, and adversary profiles tailored to your industry. Analysts receive weekly briefings on threats relevant to your organization and region. The platform flags zero-day vulnerabilities and emerging tools used by adversaries targeting your sector. Custom reporting helps you communicate threat landscape to executives and boards. Subscribers get early warning of campaigns before mainstream media coverage.

ThreatSync

Checked 3h agoDead linkPro

ThreatSync aggregates threat intelligence from 200+ public and commercial feeds into a single searchable database. The platform deduplicates intelligence and enriches it with contextual data about your industry and geography. Analysts export intelligence in formats compatible with firewalls, endpoint tools, and SIEMs. Custom feed ingestion lets you add proprietary intelligence. The system correlates threat data with your asset inventory to surface relevant threats first.

ThreatWeave

Checked 3h agoLink OKEnterprise

ThreatWeave correlates alerts across network, endpoint, and identity systems to surface true attacks in low-noise environments. The platform applies graph-based threat modeling to link suspicious behaviors across data sources. Automated response playbooks for common attack patterns reduce mean time to respond by 60 percent. Built-in threat intelligence enrichment matches detections against known TTPs and malware signatures. Enterprise customers appreciate the ability to customize detection logic for industry-specific threats.

VisibilityHub

Checked 3h agoDead linkPro

VisibilityHub aggregates metrics and alerts from security tools into a single command center dashboard. The platform supports custom widgets and drill-down views for different SOC roles. Analysts see system status, alert queue depth, and open incident counts at a glance. Mobile alerts ensure on-call engineers get notified of critical events. Organizations use VisibilityHub to unify visibility across point tools and reduce context switching.

VulnHunter

Checked 3h agoDead linkPro

VulnHunter scans your deployed applications and infrastructure for known and unknown vulnerabilities in real time. The scanner integrates with CI/CD pipelines to block deployments that exceed risk thresholds. Remediation guidance ties each finding to relevant patches and workarounds. The tool prioritizes by exploitability and impact, not just severity scores. Development and security teams use it to shift left on vulnerability management.

Beekeeper

Checked 3h agoLink OKEnterprise

Beekeeper is a frontline employee platform for workers who are not at a desk. It uses AI translation so teams across many countries can chat in their own languages. Managers share news, forms, and shift updates through a secure mobile app. Industries like hospitality, retail, and manufacturing rely on Beekeeper to reach deskless workers.

Bevy

Checked 3h agoLink OKEnterprise

Bevy is a community events platform for companies that run user groups and chapters worldwide. It includes AI-driven matchmaking that connects members with similar interests during events. Organizers can track attendance, run hybrid sessions, and measure community health over time. Large programs at companies like Salesforce and Asana run on Bevy.

Blackbaud

Checked 3h agoLink OKEnterprise

Blackbaud is a software company serving nonprofits, schools, and foundations for decades. Its suite includes Raiser's Edge, Financial Edge, and various fundraising and finance products. AI is embedded across the platform to forecast gifts, spot risks, and draft communications. It remains one of the most widely used vendors in the social good sector.

Bloomerang

Checked 3h agoLink OKPro

Bloomerang is a donor management platform focused on boosting donor retention. It uses AI-driven retention analytics to flag donors at risk of lapsing and recommends thank-you moments. Built-in fundraising tools cover donation pages, email, and reporting in one place. Small and mid-size nonprofits often use it as their main fundraising system.

Blush

Checked 3h agoLink OKFree plan available

Blush is an AI dating simulator from the team behind Replika. Users practice meeting, flirting, and going on dates with a wide range of AI characters. The app is designed to build confidence and sharpen social skills in a safe space. It is aimed at people who want to get better at dating before trying in the real world.