Top 73 alternative sites to xerosecurity.com

  1. h3llwings.wordpress.com
    h3llwings.wordpress.com
  2. h3llwings | Another InfoSec/Dev Blog
    Another InfoSec/Dev Blog
    Author: H

  3. rootflag.io
    rootflag.io
  4. RootFlag.io
    #InfoSec nerds personal CTF blog. Hack the Box writeups amongst other tips and tricks!

  5. firecompass.com
    firecompass.com
  6. FireCompass| Continuous Automated Red Teaming (CART) & ASM
    FireCompass is a Saas platform for Continuous Automated Red Teaming (CART) + Attack Surface Management (ASM). See the "Hackers View of Your Attack Surface".

  7. randori.com
    randori.com
  8. Randori | The Leaders in Attack Surface Management
    Randori is your trusted adversary. Our automated attack platform enables security teams to regain control of their attack surface and test their defenses.

  9. horizon3.ai
    horizon3.ai
  10. Home – Horizon3.ai
    Horizon3.ai enables organizations to continuously assess the security posture of their enterprise across many attack surfaces.
    Author: Horizon

  11. cynergy.app
    cynergy.app
  12. Cynergy : ASM - Attack Surface Management | Cynergy App
    Cynergy is a strategic risk-driven attack surface for enterprises with lean cybersecurity teams, to support agile development security at scale

  13. y-security.de
    y-security.de
  14. ****-Security GmbH
    Y-Security performs Attack Simulations, **** Tests, and Security Trainings.Attack Simulations show realistic attacks against a company. In our **** Tests we perform security assessments against defined systems. In our Security Trainings we transfer our experience to your team.

  15. beefproject.com
    beefproject.com
  16. BeEF - The Browser Exploitation Framework Project
    BeEF is a security tool, allowing a **** tester or system administrator additional attack vectors when assessing the posture of a target

  17. thehackernews.com
    thehackernews.com
  18. The Hacker News - Cybersecurity News and Analysis
    The Hacker News is the most trusted, widely-read infosec source of the latest hacking news, cyber attacks, computer security, and cybersecurity for ethical hackers, **** testers, and information technology professionals.

  19. omitas.com
    omitas.com
  20. Omitas - IT security audits, Custom enterprise software development
    Omitas are experts in Information Security Management, Custom Enterprise Software Development, Security Audits, **** Tests, Cyber Defense

  21. sweepatic.com
    sweepatic.com
  22. The European Leader in Attack Surface Management - Sweepatic
    A user-friendly platform that automates the discovery and security analysis of your online attack surface.

  23. cyberwing.pk
    cyberwing.pk
  24. Home 5 - Cyber Security Company
    01 **** Testing Our in-house team of **** testers consists of CREST registered accredited testers provides their best 02 Data Protection Protect your data, endpoints, websites, emails, hardware, software, and cloud solutions offered by Cyberwing 03 Certified Ethical Hackers We have a team of professional ethical hackers, who are certified and provides their best to […]
    Author: Admin

  25. pulsarsecurity.com
    pulsarsecurity.com
  26. Offensive Network Security | Enterprise Security Software | Pulsar Security
    We are a cybersecurity company with an elite team of security professional and software engineers who help manage & protect large enterprises.
    Author: Pulsar Security

  27. gustavobonito.pt
    gustavobonito.pt
  28. Gustavo Bonito
    Full-Time **** Tester, Security Researcher, Bug Hunter. Offensive Security Certified Professional (OSCP)
    Author: Gustavo Bonito

  29. qualitians.com
    qualitians.com
  30. Qualitians - We believe in Quality.
    Qualitians is the popular and trusted, widely-read infosec source of cyber security, information security, data protection & security, latest hacking news, computer security, cyber attacks and cybersecurity for ethical hackers, **** testers, cyber experts and information technology professionals.
    Author: Qualitians

  31. 5ub.in
    5ub.in
  32. Subin Varghese | Cyber Security Consultant | Ethical Hacker | OSCP | ESCA
    Hello! I’m Subin Varghese. OSCP, ESCA, ISMS Certified Cyber Security Consultant & **** Tester With 3.5+ Years Of Experience In Cyber Security Field. Red Teaming Experience With All Kinds Of Tools & Techniques Used For Both Automated & Manual **** Testing.

  33. ioactive.com
    ioactive.com
  34. IOActive | Research-fueled Security Services
    Research based software, hardware, networks and human resource security services. Leader in attacker emulation based **** testing, red and purple team services.

  35. pentester.es
    pentester.es
  36. Jose Selvi – **** Tester & Security Researcher
    **** Tester & Security Researcher
    Author: Jose Selvi

    Other sites like xerosecurity com

  37. shubs.io
    shubs.io
  38. Shubham Shah
    Co-founder, security researcher. Building an attack surface management platform at Assetnote

  39. gpentest.com
    gpentest.com
  40. gPentest - **** Testing Guides | by G5 Cyber Security, Inc. (G5CS)
    Quick start guides to help **** Testers start and finish their **** Testing engagements, professionally. Developed by G5 Cyber Security Inc.

  41. fullhunt.io
    fullhunt.io
  42. FullHunt | Expose Your Attack Surface
    Discover, monitor, and secure your attack surface. FullHunt delivers the best platform in the market for attack surface security.

  43. dixitaditya.com
    dixitaditya.com
  44. Aditya Dixit
    Aditya Dixit - **** Tester and Security Researcher

  45. aptasolutions.com
    aptasolutions.com
  46. HOME
    Value-Added Distributor in South Europe and Latin America for Broadcom’s Enterprise Software Solutions Business Management Agile Management Continuous Testing Delivery & Automation Security & Integration AI OPS Management USERS
    Author: Admin

  47. lennox.com.au
    lennox.com.au
  48. Lennox Computer Home
    LILAC - Comprehensive Accounting and Business management software. Whole of Enterprise Automation.

  49. hstechnology.cz
    hstechnology.cz
  50. HS Technology Inc. - Software and analysis for informational security
    HS Technology is a technology company developing software solutions for computer security. Our analysts then investigate security incidents, and **** testers do everything to prevent them from happening.

  51. rehanbari.com
    rehanbari.com
  52. My journey to eCPPT - My journey to eLearnSecurity Certified Professional **** Tester certification
    My journey to eLearnSecurity Certified Professional **** Tester certification
    Author: Rehanb

  53. securitysolutionconsultants.com.au
    securitysolutionconsultants.com.au
  54. Home - Security Solution Consultants
    We provide Consulting/Professional services for Cyber Security Risk Management, Managed Security Services, Security Advisory, Cloud Security, ISO 2700 Implementation/Auditing, Vulnerability Scans and **** Testing read more • • • • • • • • • • • • • • • • • • • • • • • • • • • • • […]

  55. vpentest.io
    vpentest.io
  56. Vonahi Security: Automated **** Testing & Cyber Security Services - vPenTest Landing
    Vonahi Security is building the future of offensive cybersecurity consulting services through automation. We provide the world's first and only automated **** test that replicates full attack simulations with zero configuration. Hello World, Meet Modern Security.

  57. centralinfosec.com
    centralinfosec.com
  58. Central InfoSec - Cyber Security
    Central InfoSec Cyber Security specializes in red teaming, **** testing, vulnerability assessments, web applications, managed phishing, vCISO support, security training, and other professional information security services.

  59. upguard.com
    upguard.com
  60. Third-Party Risk and Attack Surface Management Software | UpGuard
    Third-party risk and attack surface management software. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day.

  61. immuniweb.com
    immuniweb.com
  62. ImmuniWeb® | Application **** Testing, Dark Web and Attack Surface Monitoring
    ImmuniWeb® AI Platform for Application Security Testing, Attack Surface Management & Dark Web Monitoring. Try now.

  63. coresentinel.com
    coresentinel.com
  64. Australia's #1 **** Testing Service | Core Sentinel
    We'll make your systems fully compliant with our OSCE / OSCP & CREST certified **** Testing. Core Sentinel is a team of highly qualified and experienced **** testers. We specialise in **** testing, technical risk assessment, security risk remediation, and security consulting so you don't have to.
    Author: - Glenn Murray; Owner; DIVINE WRITE

  65. 0xprial.com
    0xprial.com
  66. Prial Islam - Ethical Hacker || Cyber Security Researcher
    I’m a Security Researcher and Red Team Member at Synack. I’m currently working in the cybersecurity sector mainly as a Bug Bounty Hunter and **** Tester.
    Author: Admin Tamim

  67. model-technology.com
    model-technology.com
  68. Model Technology Solutions
    Your trusted experts in Enterprise Unified Endpoint Management, Security, and Automation.
    Author: Model WebAdmin

  69. ridgesecurity.ai
    ridgesecurity.ai
  70. Automated Security Operation | Ridge Security
    Ridge Security helps you improve efficiency of security operations by risk-based vulnerability management with automated **** testing solution.

  71. huddle.com
    huddle.com
  72. Online Document Collaboration Software & Client Portal Solutions
    Team collaboration software for enterprise and government. Manage tasks, projects and documents simply in secure client portals with Huddle.

  73. langner.com
    langner.com
  74. Tools to manage the digital transformation of OT/ICS
    OT/ICS asset management software and security policies, brought to you by the team that cracked Stuxnet. Designed for large enterprises.

  75. graphus.ai
    graphus.ai
  76. Graphus - Anti Phishing Software | Cloud Email Security
    Graphus is automated email security software, providing security for G Suite & Office 365 users against phishing & social engineering attacks.

    What else xerosecurity.com alternative websites

  77. document-genetics.co.uk
    document-genetics.co.uk
  78. Home of Document Management Software and Business Automation Solutions
    Document Management Software, Process Automation Software, ERP Enterprise Output Management, ABBYY Advanced Document Scanning, Mobile Forms Data Capture

  79. steflan-security.com
    steflan-security.com
  80. Steflan's Security Blog
    I am a **** tester and a cyber security and Linux enthusiast.Through this blog, I would like to share my passion for **** testing, hoping that this might be of help for other students and professionals out there. I will be more than glad to exchange ideas with other fellow pentesters and enthusiasts.

  81. cobaltstrike.com
    cobaltstrike.com
  82. Software for Adversary Simulations and Red Team Operations
    Cobalt Strike is threat emulation software. Red teams and **** testers use Cobalt Strike to demonstrate the risk of a breach and evaluate mature security programs. Cobalt Strike exploits network vulnerabilities, launches spear phishing campaigns, hosts web drive-by attacks, and generates malware infected files from a powerful graphical user interface that encourages collaboration and reports all activity.

  83. rthreat.net
    rthreat.net
  84. Breach and Attack Emulation Platform: Validate and Protect | rThreat
    Reduce your attack surface, continuously validate your security controls with the leading breach and attack emulation platform.

  85. davidhamann.de
    davidhamann.de
  86. David Hamann
    I’m a software developer, **** tester and IT consultant. You can hire me for your project.
    Author: David Hamann

  87. uptycs.com
    uptycs.com
  88. Uptycs – Cloud-Native Security Analytics
    The Uptycs Cloud-Native Security Analytics Platform makes security telemetry—across all your modern attack surfaces—easily understandable and accessible so security teams can get the answers they need, quickly.
    Author: Uptycs; Inc

  89. socautomation.com
    socautomation.com
  90. Home - Honeycomb SOCAutomation
    SOCAutomation Detects Multitudinal Threats Automating Incident Response Across All Security Planes Automated Threat Intelligence DataHelix TI Edge AI Threat Intelligence Automatically extract, detect, mine and investigate all your TI artifacts (domains, URLs, IP addresses, file hashes etc.) observed in your entire enterprise including zero-day attacks! Instantly be notified of all detected threats and attacks …No human …

  91. jibble.org
    jibble.org
  92. Jibble - Paul Mutton
    Home page of Paul Mutton - Java developer, photographer and **** tester/security consultant.

  93. softwaresecured.com
    softwaresecured.com
  94. Software Secured | **** Testing as a Service (PTaaS)
    At Software Secured, we help DevOps teams at fast-moving SaaS companies ship more secure code through **** Testing as a Service.

  95. fusionworks.md
    fusionworks.md
  96. FusionWorks - Outstaffing and product development
    Software and product development, dedicated teams, developers, designers, testers, product managers, analytics.
    Author: Admin

  97. promys.com
    promys.com
  98. Enterprise Professional Services Automation (PSA) Software - Promys
    Promys makes the world's best enterprise Professional Services Automation software. Our CRM, Help Desk, and PSA solutions are easy to implement and manage.

  99. s3security.com
    s3security.com
  100. S3 Custom-tailored Cyber Security Programs
    Specialized Security Services provides cyber security, device **** testing, enterprise security and much more.

  101. zon.tools
    zon.tools
  102. Ignite your Amazon Sponsored Products Ads • Zon.Tools
    Enterprise Amazon PPC Automation and Management Software. Automate Amazon Sponsored Products best practices and manage Campaigns in an unprecedented way!

  103. secureset.com
    secureset.com
  104. Home | SecureSet Cybersecurity Academy
    Secure your future with cybersecurity education. At SecureSet, you get real-world experience to develop the skills you need to get into a cybersecurity career as a technical analyst, security engineer, **** tester or security consultant.
    Author: Great Choice; Great Experience

  105. un4gi.io
    un4gi.io
  106. Un4gi
    Tips and techniques for Bug Bounty Hunters, Red Teamers, **** Testers, and other security minded individuals.
    Author: Tony West un

  107. digdes.com
    digdes.com
  108. Digital Design — Business Software Development Services
    Digital Design provides professional full-cycle services: business processes automation, enterprise project management for Office 365, intranet, business software customization, custom software development.

  109. chef.io
    chef.io
  110. Chef Software DevOps Automation Solutions | Chef | Chef
    Chef Software's DevOps automation tools enable the coded enterprise to overcome complexity with infrastructure, security and application automation for your technology.

  111. hacware.com
    hacware.com
  112. HacWare - 100% Automated Security Awareness & Training API
    HacWare is an 100% automated security awareness training API that helps Software Developers and MSPs combat phishing attacks and BEC scams.

  113. keramas.github.io
    keramas.github.io
  114. Home | An Utsusemi of Keramas
    Tales of security research, **** testing, red teaming, and general hacking shenanigans.

  115. powerr.dev
    powerr.dev
  116. Home - Brand
    Aspiring **** Tester, currently partaking in CTF's, HTB and THM

    Other websites similar as xerosecurity.com

  117. teklynx.com
    teklynx.com
  118. Barcode label design, print, and management software | TEKLYNX
    TEKLYNX, the leader in barcode label software. Label design, label printing, print automation, label security, and centralized label management. Small business to global enterprise.
    Author: Bob Woodward

  119. securit360.com
    securit360.com
  120. Home - SecurIT360
    Assessments & **** Testing Compliance & Standards Monitoring & Incident Response Managed Services & Consulting About SecurIT360 SecurIT360 is a full-service security consulting firm which was founded in 2009. It’s founder, David Forrestall (CISSP, CISA), has put together a team of credentialed professionals who are collectively focused on the physics of securing IT. We are […]

  121. tangiblesecurity.com
    tangiblesecurity.com
  122. Cybersecurity and Product Security Assurance Services and Consulting | Tangible Security
    **** Testing services and cyber security consulting for organizations and enterprises.

  123. softwaresecurity.nz
    softwaresecurity.nz
  124. Software Security NZ - **** Testing and Security Specialists
    Software Security NZ - **** Testing and Security Specialists.

  125. rootbrain.com
    rootbrain.com
  126. RootBrain.Com · The Best IT Security Training & Consulting · Pusat Pelatihan dan Jasa Konsultasi Keamanan Teknologi Informasi (TI) di Yogy
    RootBrain.Com · The Best IT Security Training & Consulting · Pusat Pelatihan dan Jasa Konsultasi Keamanan Teknologi Informasi (TI) di Yogyakarta · IT Training Jogja · Pelatihan TI Jogja · Jasa **** Testing Jaringan dan Sistem Informasi · Pentest Server & Network · Professional **** Tester
    Author: Admin

  127. principlelogic.com
    principlelogic.com
  128. Principle Logic, LLC - Information security consulting, assessments, speaking engagements, writing, and expert witness services
    Atlanta Georgia independent computer information security consultant, **** tester, speaker, writer, cyber security, Kevin Beaver, CISSP

  129. billbooks.co.in
    billbooks.co.in
  130. Bill Books - Billing Management Software - Manage your business sales, purchases, payments and customers
    Manage your Business with Professional Online Billing Automation Software

  131. safebreach.com
    safebreach.com
  132. The Leading Continuous Breach and Attack Simulation Platform | SafeBreach
    Reduce your attack surface, continuously validate your security controls, and improve your risk posture with the leading breach and attack simulation platform.
    Author: SafeBreach Inc

  133. metasploit.com
    metasploit.com
  134. Metasploit | **** Testing Software, Pen Testing Security | Metasploit
    Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the world's best **** testing software now.

  135. guardiantcs.com
    guardiantcs.com
  136. Home
    Manage your network more efficiently with MSP software and security software built specifically to solve and protect you from the problems you face each day. Guardian MSP management solutions enable you to deliver high quality, secure services, and automate your most frequent IT tasks with a level of Security and protection.

  137. sqa.stackexchange.com
    sqa.stackexchange.com
  138. Software Quality Assurance & Testing Stack Exchange
    Q&A for software quality control experts, automation engineers, and software testers

  139. yaksas.in
    yaksas.in
  140. Welcome to Yaksas CSC – Cyber Security Research Lab in India
    Hands-on ethical hacking training and workshops, red team labs, security risk managment and **** testing services.

  141. project-open.com
    project-open.com
  142. ]project-open[ Open Source Project Management Software
    Enterprise ready Open Source Application for Project Management/PMO, IT Service Management and Professional Service Automation.
    Author: Project Open Business Solutions S.L

  143. ctdefense.com
    ctdefense.com
  144. **** TESTING IS WHAT WE DO
    **** TESTING IS WHAT WE DO We strongly believe that our unique combination of competencies make us a good candidate to deliver any project We are a security consulting company, founded by senior **** testers and security managers, offering certified Cyber Security Services of highest quality possible, for clients in UK, US, EMEA and Middle […]