2026 Best Software Awards are here!See the list
Search results for
Stacker
(673)
Star Rating
Categories
Categories(3)
Sellers(62)
Solutions(0)
Discussions(5)
Articles(184)
Advanced FiltersClear Filter
Star Rating
Categories
The next elements are filters and will change the displayed results once they are selected.
Product Description

RevBits Deception Technology is the only deception solution on the market with dual-layer virtualization and real honeypot servers. Deploy multiple honeypots with the click of a button and minimal resource consumption. Manual and automated implanted credentials lure attackers to honeypots, revealing the original breached system.

Not seeing what you're looking for?

Dive deeper into "Stacker" on G2 AI

Product Description

Movavi Academic is a program designed to help you create educational videos. Whether you’re a teacher, a student, or an educational administrator, Movavi Academic is for you. For students With Movavi Academic, you can create clips and presentations, and record screencasts for homework assignments. In screen recording mode, you can save online lessons to review later and record program activities to create instructions. Start with the basic features and move on to advanced tools, like Chr

Product Description

Redesign With AI is an innovative platform that leverages artificial intelligence to simplify and enhance the design process. It enables users to create high-quality design assets such as icons, logos, stickers, posters, coloring pages, mockups, tattoos, and illustrations efficiently. By automating complex design tasks, Redesign With AI empowers both novice and experienced designers to produce professional-grade visuals without the need for extensive design skills or expensive software. Key Fea

Product Description

Our famous CoreThreats is built by aggregating and analyzing over 800 quality threat intelligence feeds, applying human and machine intelligence, then rapidly updating the managed rules to block threats and attacker infrastructure. CoreThreats stops a broad range of attacks with very high accuracy.

Product Description

Monitor the cyber risks of your subsidiaries, vendors or supply chain from an attackers perspective. Invite the companies you care about most to the BreachRisk Platform to enable verification and penetration testing of discovered risks to eliminate false positives and get the highest-fidelity view of the cyber risks in your third-parties.

Product Description

SwiftSafe’s Penetration Testing service is designed to provide organizations with a deep, thorough, and practical evaluation of their overall cybersecurity posture, ensuring that vulnerabilities are identified before malicious actors have the chance to exploit them. In today’s rapidly evolving digital landscape, where cybercriminals are leveraging increasingly sophisticated attack techniques, penetration testing has become an essential layer of defense for businesses across industries. Unlike au

Product Description

Stackavenue launched DailyPloy, a one-stop solution to manage the resources and tasks collaboration. Today, We provide a solution that helps our clients to focus on your planning while DailyPloy organizes every team’s tasks for project success. DailyPloy is totally customizable as per your Industry, Department, and Requirements.

Product Description

VanishID systematically reduces the digital footprint of executives, board members, employees, and their families—limiting their visibility to threat actors. We control what attackers can find, removing the raw material they need to craft convincing attacks. VanishID is a turnkey managed service powered by agentic AI and OSINT experts.

Product Description

Praetorian is an offensive cybersecurity company dedicated to preventing breaches before they occur. By emulating attackers, Praetorian uncovers material risks that could lead to compromise, enabling organizations to proactively address vulnerabilities before malicious actors exploit them. Their mission is to create a future without compromise by providing comprehensive security solutions tailored to each client's unique needs. Key Features and Functionality: - Chariot Platform: An AI-enabled

Product Description

Recover deleted photos, contacts on Android, recover deleted whatsapp messages. RecoverGo-Android data recovery is an all-in-one data recovery software for Android users. With a few steps, you can easily recover deleted messages, contacts, pictures, videos, call logs, and audio on Android even if the device is broken. In the latest version of RecoverGo (Android), you can also retrieve deleted WhatsApp messages, photos, contacts, phone numbers, status, stickers, videos, audio, and files withou

Product Description

Playground.AI is a free AI-powered design tool that empowers users to create a wide array of visual content effortlessly. Catering to both beginners and professionals, it offers an intuitive platform for designing logos, t-shirts, social media graphics, and more. By leveraging advanced artificial intelligence, Playground.AI simplifies the design process, enabling users to produce high-quality visuals without the need for extensive design experience. Key Features and Functionality: - Diverse Te

Product Description

Starter Stack AI: AI-Powered Internal Tools for Modern Asset Management deploys specialized AI agents that plug directly into your current workflows, eliminating the need for costly and time-consuming system overhauls. Starter Stack.ai Key's features • Automated Portfolio Analysis

Product Description

OFFENSAI is an AI-powered cloud security testing solution that uses proprietary generative adversarial techniques and unpublished attack vectors to act like real attacker behavior, revealing exploitable kill chains with one-click remediation guidance. Continuous, safe simulations deliver actionable insights, reduce real risk, and produce compliance-ready reporting without disrupting production.

Product Description

Auspex Observatory™ processes network and systems telemetry to provide real-time threat analysis and visualization. Internal and external attackers can be rapidly identified and mitigated. This tool uses behavioral and anomaly detection for finding aberrant activities on your network. We are not using signature based detection. Our analytics can start generating risk assessments within 30 minutes.

Product Description

Patara is a blockchain-based password and account manager ensuring the protection of passwords, crypto wallets, and sensitive data. Thanks to user-based smart contracts, there is no such thing as leakage of all data. Unlike Web2 solutions, Patara offers a decentralized solution. Each user has its own smart contract. This makes it impossible for attackers to find the data and its owner.

Product Description

TAFA Shield managed security services are powered by BlackBerry® cybersecurity technology, which provides an AI-driven, automated, prevention-first approach to endpoint protection. The BlackBerry® technology delivers the detection and prevention capabilities needed to stay ahead of attackers, keeping your business secure. ​It is an accurate, efficient, and effective solution for preventing advanced persistent threats and malware from executing on an organization's endpoints.

Product Description

Guardpot is a Honeypot Management Platform used in cybersecurity management. It allows users to manage different types of honeypots from a central platform, collect and monitor attack attempts. The collected data can be used for automatically blocking attacker IP addresses and for IoC (Indicators of Compromise) data. With GuardPot, you can provide a proactive layer in your security defenses. Deception Master!

Product Description

Print UPS shipping labels. Create and print your own UPS shipping labels with savings up to 89%. No fees, no hassle.

Product Description

Email marketing with everything you need and nothing more.

Product Description

Easily create custom giveaways to collect emails, gain followers, and make your fans happy.