Skip links

AI Tools catalog

Filters

10 tools found

Security
Securitybulldog

The Security Bulldog is an AI-powered cybersecurity intelligence platform that gathers the largest collection of open-source threat intelligence, customized for each user's role, team, and industry, to assist cybersecurity teams in understanding threats more quickly, making better decisions, and accelerating detection and response

Security
Greip

Greip is an AI-powered fraud prevention platform offering services such as IP geolocation, VPN/proxy detection, and profanity API, with different pricing tiers for varying levels of traffic and features

Security
TrueFace.AI

Trueface is a company that specializes in developing AI-powered solutions for various industries, including security and access control, by harnessing the power of machine learning and artificial intelligence to transform camera data into actionable intelligence

Security
Ambient AI

Ambient.ai offers a computer vision intelligence system focused on human-machine collaboration to prevent security incidents, with a significant reduction in false alarms and enhanced threat detection capabilities.

Security
Pentest Copilot AI

Pentest Copilot by BugBase is a cybersecurity tool designed to facilitate efficient and legal penetration testing, providing a platform for cybersecurity professionals to enhance their skills and contribute to the improvement of digital security

Security
RiskAssessmentAI

There are no helpful search results for

Security
Loti

GoLoti.com is a platform that offers content protection services, including the removal of image and video leaks, hacks, and deepfakes, with an AI-powered dashboard and DMCA takedown process.

Security
AI vs Product Manager

AI vs Product Manager is a GPT prompt-engineering tool based on OpenAI's ChatGPT, offering over 30 prompts and built on Vercel technology

Security
Ethiack

ETHIACK is an autonomous ethical hacking platform that provides real-time monitoring, comprehensive testing, and strategic insights to uphold the integrity of digital assets and prioritize actions in the face of intensive cybersecurity risks

Explore
Drag