The Best 2735 Security Alternatives

  • Marshal icon

    Marshal

    Marshal is the only online tool that lets you quickly scan your cloud services to immediately reveal exposed sensitive data you might be sharing. Marshal works with...

  • NoVirusThanks Malware Remover icon

    NoVirusThanks Malware Remover

    Free malware remover for Windows. Easily detect and remove popular trojans, spyware and rogue security software from your computer. Easy to use interface.

  • Greenfish DataMiner icon

    Greenfish DataMiner

    Greenfish DataMiner recovers lost files from a damaged optical disc (CD or DVD). Use it to rescue your important files from a scratched disc, or e.g. an accidentally...

  • S2S icon

    S2S

    S2S is a free iPhone/iPad app that enables you to not only encrypt files and store them in Dropbox, but also to share these encrypted files with your friends without...

  • Safebox icon

    Safebox

    Safebox encrypts and syncs files with your Cloud folder. Thanks to generated keys, no more remembering passwords and dealing with strength of passwords. Create...

  • Encryption Wizard icon

    Encryption Wizard

    Encryption Wizard (EW) is a simple, strong, Java file and folder encryptor for protection of sensitive information. EW encrypts all file types for data-at-rest and...

  • ACRIBA logdog icon

    ACRIBA logdog

    Comparable with fail2ban but based on Java and optimized for high performance. Log scans log files (e.g. /var/log/apache/access_log) and bans IPs that show the malicious...

  • LF Intrusion Detection icon

    LF Intrusion Detection

    Lit Fuse Intrusion Detection (LID) protects your Windows system from brute force attacks and other intrusion attempts by placing a brick wall between your server and...

  • SpyLog icon

    SpyLog

    Monitor logs from several sources and execute actions based on some rules. Can be used to protecet against brute-force attacks.

  • DeHashed icon

    DeHashed

    DeHashed is the largest & fastest data breach search engine. You can search for IP address, email, username, name, phone, VIN, address, and more! We have true wild...

  • LEAKED.SITE icon

    LEAKED.SITE

    LEAKED.SITE is a website dedicated to offering you FREE HACKER TOOLS, Such as DDoS, DB Search, Skype Resolves, And More! - Databases Uploaded Every Week - Skype...

  • NuclearLeaks icon

    NuclearLeaks

    The biggest free-to-download collection of publicly available website databases for security researchers and journalists.

  • Hacksy icon

    Hacksy

    Hacksy is a security service where interaction occurs through a chatbot that can advise on things like password strength and social engineering concerns and also keep...

  • Comodo Endpoint Protection icon

    Comodo Endpoint Protection

    Comodo Advanced Endpoint Protection (AEP) provides the world’s most sophisticated and comprehensive endpoint protection platform.

  • CrowdStrike Falcon icon

    CrowdStrike Falcon

    Detect, prevent, and respond to attacks with next-generation endpoint protection.

  • CylancePROTECT icon

    CylancePROTECT

    Stop merely detecting attacks, prevent them using CylancePROTECT, the only enterprise endpoint solution that blocks 99% of threats in real time BEFORE they cause harm.

  • Sophos Virus Removal Tool icon

    Sophos Virus Removal Tool

    Infected with a virus? Unsure whether your existing antivirus software has detected and removed it? Still having problems and unsure where to turn to next? Sophos Virus...

  • wail2ban icon

    wail2ban

    wail2ban is a windows port of the basic functionality of fail2ban, and combining elements of ts_block.

  • cvechecker icon

    cvechecker

    The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database....