Alternatives to REMnux
Compare REMnux alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to REMnux in 2026. Compare features, ratings, user reviews, pricing, and more from REMnux competitors and alternatives in order to make an informed decision for your business.
-
1
Portainer Business
Portainer
Portainer is an intuitive container management platform for Docker, Kubernetes, and Edge-based environments. With a smart UI, Portainer enables you to build, deploy, manage, and secure your containerized environments with ease. It makes container adoption easier for the whole team and reduces time-to-value on Kubernetes and Docker/Swarm. With a simple GUI and a comprehensive API, the product makes it easy for engineers to deploy and manage container-based apps, triage issues, automate CI/CD workflows and set up CaaS (container-as-a-service) environments regardless of hosting environment or K8s distro. Portainer Business is designed to be used in a team environment with multiple users and clusters. The product includes a range of security features, including RBAC, OAuth integration, and logging - making it suitable for use in complex production environments. Portainer also allows you to set up GitOps automation for deployment of your apps to Docker and K8s based on Git repos.Starting Price: Free -
2
YUM
Red Hat
Installing, patching, and removing software packages on Linux machines is one of the common tasks every sysadmin has to do. Here is how to get started with Linux package management in Linux Red Hat-based distributions (distros). Package management is a method of installing, updating, removing, and keeping track of software updates from specific repositories (repos) in the Linux system. Linux distros often use different package management tools. Red Hat-based distros use RPM (RPM Package Manager) and YUM/DNF (Yellow Dog Updater, Modified/Dandified YUM). YUM is the primary package management tool for installing, updating, removing and managing software packages in Red Hat Enterprise Linux. YUM performs dependency resolution when installing, updating, and removing software packages. YUM can manage packages from installed repositories in the system or from .rpm packages. There are many options and commands available to use with YUM.Starting Price: Free -
3
NOSH ChartingSystem
NOSH
NOSH ChartingSystem is an electronic health record system designed exclusively for doctors and patients. This is a new mobile-friendly version that is now based on the Laravel PHP framework and jQuery. NOSH has FHIR, Bluebutton, ICD-10, GoodRX API, RXNorm API, Phaxio, and UMA support. Installing NOSH ChartingSystem is easy to install if you run Docker NOSH. NOSH and all its dependencies are already configured and installed properly. Just deploy the Vagrant virtual machine and you're ready to start. The previous method through Ubuntu Linux PPA's is now depreciated. If you have access to a terminal shell for your server (any distro for Linux or Mac OS-X), you can install NOSH. The installation script automatically adds scheduled task commands (cron files) and web server configuration files to make NOSH work seamlessly the first time. The script also determines if your system meets all the package dependencies before installation. For detailed information, go to the Wiki link.Starting Price: $50 per month -
4
Distro
Distro
Transform your ideas into compelling content through natural conversations. Distro helps you create, edit, and publish faster than ever. Distro is a platform designed to streamline content distribution for creators. It offers tools to efficiently manage and disseminate content across various channels, enhancing reach and engagement. With a user-friendly interface, Distro simplifies the process of sharing content, allowing creators to focus more on producing quality material. It supports integration with multiple social media platforms, ensuring that content reaches the intended audience effectively. Additionally, Distro provides analytics to track performance, helping users make informed decisions about their content strategy.Starting Price: $20 per month -
5
System On Grid
System On Grid
We are redefining internet by converging cloud infrastructure by merging Orbits (VPS – Virtual Private Servers) with Web Hosting which provides dedicated and scalable resources, security, isolation, and automation backed by very high reliability and 99.99% uptime guarantee. Our Orbits come with different specs and different flavors like CentOS, Ubuntu, Debian, Fedora, Free BSD, Net BSD etc. providing a lot of flexibility. The backend uses Intel E-5 processors, KVM hypervisor and Openstack. System On Grid Orbits are Virtual Instances (Virtual Private Servers/Machines) run by KVM hypervisor. The Orbits come with multiple Operating System Flavors including different Linux Distros like Centos, Ubuntu, Debian, Fedora etc. Orbits also have an option of Unix flavors viz Free BSD and Net BSD. Orbits take full advantage of Intel CPUs VTX features and hardware abstraction. We also have tweaked the Host kernel to provide strong and robust performance.Starting Price: $8 per month -
6
Bodhi Linux
Bodhi Linux
Bodhi Linux, a lightweight distribution featuring the fast & fully customizable Moksha Desktop. The 64-bit is built on top of Ubuntu (20.04). The 32-bit Non-PAE architecture has a Ubuntu 18.04 base, Bodhi Linux 6.0.0 is the Enlightened Linux Distribution. Bodhi is a small open-source distro with a rather small team of active Team Members, we are always looking for help. In particular, we are looking for c, bash, and python programmers, translators, graphic artists, theme developers, and more. If you think you can help contact us. Not all users can contribute to the code and documentation so even a small financial donation helps tremendously. It’s known for minimalism, resource efficiency, and user choice. The team behind Bodhi Linux works to make the distribution as lean as possible and believes that the end-user should be able to choose the applications that they want rather than have a bunch of pre-installed applications that are unnecessary. -
7
Threat.Zone
Malwation
Threat.Zone is a hypervisor-based, automated and interactive tool for analyzing malware , you can fight new generation malware.Starting Price: $99 per month -
8
Budgie Clipboard Manager
prateekmedia
A clipboard manager applet that can help you to store and manage clipboard content. Clipboard history management, save up to 100 clips, private mode, remove any clip you want. Searchable history, clear all options, autosave history, notification support. Customizable applet, and restore defaults option. Automatically paste selected clip to the active window. For Debian/Ubuntu-based distro. If you are using Ubuntu Budgie then you can directly install the applet from the welcome screen. xdotool is optional and is used for pasting text in the active window. Download the zip & then run from the extracted repo's folder.Starting Price: Free -
9
DistroKid
DistroKid
DistroKid is a service for musicians that puts your music into online stores & streaming services. Then when people listen to your music, we send you money. All your music should be in stores. DistroKid is the only service that lets you upload unlimited music to stores for one low price and keep 100% of your earnings. Other services make you pay every time you upload something, or they take a percent of earnings—which is way less fun (and way more expensive). DistroKid gets your music into stores in a fraction of the time it takes our competitors to get your music into stores. DistroKid is for solo musicians, artists, bands, DJs, performers, producers, and creators who record music at home or in the studio. We have services for labels, too. We distribute your music on Spotify, Apple Music, TikTok, Pandora, Amazon, Instagram, YouTube, Tidal, iHeartRadio, Deezer and many other stores and streaming services.Starting Price: $19.99 per year -
10
Amazon EKS Anywhere
Amazon
Amazon EKS Anywhere is a new deployment option for Amazon EKS that enables you to easily create and operate Kubernetes clusters on-premises, including on your own virtual machines (VMs) and bare metal servers. EKS Anywhere provides an installable software package for creating and operating Kubernetes clusters on-premises and automation tooling for cluster lifecycle support. EKS Anywhere brings a consistent AWS management experience to your data center, building on the strengths of Amazon EKS Distro (the same Kubernetes that powers EKS on AWS.) EKS Anywhere saves you the complexity of buying or building your own management tooling to create EKS Distro clusters, configure the operating environment, update software, and handle backup and recovery. EKS Anywhere enables you to automate cluster management, reduce support costs, and eliminate the redundant effort of using multiple open source or 3rd party tools for operating Kubernetes clusters. EKS Anywhere is fully supported by AWS. -
11
EndeavourOS
EndeavourOS
A terminal-centric distro with a vibrant and friendly community at its core. A vibrant and friendly community, the beating heart of this distro, to guide you through your journey. Experience our distro with light and always evolving base. Read and download it on our latest release page. The EndeavourOS knowledge base, the place where you can find our wiki articles and video tutorials, is here as your guideline during your exploration in building your unique and personal system. Create your own destiny with an incredible journey. If you like to roll up your sleeves and go on an adventure, then you might want to give us a try. EndeavourOS isn’t an expressway to a predefined destination in computing, it is all about the journey towards your own destination, and on top of that, you’ll be meeting new and friendly faces during that exploration. Or more appropriate, your new Endeavour.Starting Price: Free -
12
Void Linux
Void Linux
Void is a general purpose operating system, based on the monolithic Linux kernel. Its package system allows you to quickly install, update and remove software; software is provided in binary packages or can be built directly from sources with the help of the XBPS source packages collection. It is available for a variety of platforms. Software packages can be built natively or cross compiled through the XBPS source packages collection. Unlike trillions of other existing distros, Void is not a modification of an existing distribution. Void's package manager and build system have been written from scratch. Void Linux supports both the musl and GNU libc implementations, patching incompatible software when necessary and working with upstream developers to improve the correctness and portability of their projects. -
13
Zmanda
Zmanda
Zmanda is a proven, reliable, high-performance enterprise backup and recovery solution. Zmanda provides a comprehensive solution at 50% less than the competition. You also get 24*7 support with a 2x higher NPS than the industry average. Since 2005, Zmanda has been trusted by enterprises, governments, and educational institutions worldwide. Zmanda enables you to back up to cloud, NAS, and disk. Zmanda supports advanced features, such as ransomware protection with air gap, client-side deduplication, forever incremental backups, and zero trust. It can be deployed as a container, VM, or Zmanda-hosted instance. Zmanda is open-source based with OpenAPI V3 standard APIs. It is packaged in all major Enterprise Linux distros, including Red Hat, Ubuntu, Debian, Rocky Linux, and Fedora.Starting Price: $499 -
14
Mempool
Mempool
Building a mempool and blockchain explorer for the Bitcoin community, focusing on the transaction fee market and multi-layer ecosystem, without any advertising, altcoins, or third-party trackers. Mempool can be self-hosted on a wide variety of your own hardware, ranging from a simple one-click installation on a Raspberry Pi distro, all the way to an advanced high availability cluster of powerful servers for a production instance. -
15
Cuckoo Sandbox
Cuckoo
You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment. Malware is the swiss-army knife of cybercriminals and any other adversary to your corporation or organization. In these evolving times, detecting and removing malware artifacts is not enough: it's vitally important to understand how they operate in order to understand the context, the motivations, and the goals of a breach. Cuckoo Sandbox is free software that automated the task of analyzing any malicious file under Windows, macOS, Linux, and Android. Cuckoo Sandbox is an advanced, extremely modular, and 100% open source automated malware analysis system with infinite application opportunities. Analyze many different malicious files (executables, office documents, pdf files, emails, etc) as well as malicious websites under Windows, Linux, macOS, and Android virtualized environments. -
16
REVERSS
Anlyz
Threat actors today are highly sophisticated and are using disruptive technologies to penetrate the security walls of enterprises in unrelenting fashion. Reverss provides automated dynamic malware analysis to enable Cyber Intelligence Response Teams (CIRT) to mitigate obfuscated malware faster and effectively. Speedy detection of malware is powered by a central detection engine to drive functions around security operations towards correct threat response. Get actionable insights on how to tackle and rapidly nullify attacks with backing from robust security libraries that track past threats and intelligently reverse new ones. Enrich tasks of security analysts to expose more threat behaviors with context to understand the scope of threat. Derive thorough Malware Analysis Reports that drill down every detail of why, how and when an evasion occurred to upkeep your experts with knowledge and defend your business from future attacks. -
17
Joe Sandbox
Joe Security
Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST). -
18
YARA
YARA
YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic. YARA-CI may be a useful addition to your toolbelt. This is GitHub application that provides continuous testing for your rules, helping you to identify common mistakes and false positives. The above rule is telling YARA that any file containing one of the three strings must be reported as silent_banker. -
19
Avira Cloud Sandbox
Avira
The Avira Cloud Sandbox is an award-winning, unlimited-scale automated malware analysis service. It blends multiple advanced analysis technologies to deliver a complete threat intelligence report from an uploaded file. The Cloud Sandbox API delivers a detailed, file-specific, threat intelligence report. It contains valuable, actionable intelligence. The report has a detailed classification of the file, information on the techniques, tactics and procedures (IoCs) present in the threat, and a description of how and why the submitted file was identified as clean, malicious, or suspicious. Avira’s Cloud Sandbox leverages the technologies developed within the Avira Protection Cloud, the cloud security system that underpins the anti-malware and threat intelligence solutions of Avira. Through OEM technology partnerships we protect many of the world’s leading cyber-security vendors, and nearly a billion people world-wide. -
20
FileAlyzer
Spybot
If you want to know more about the inner life of files, FileAlyzer is the tool you urgently need! FileAlyzer shows basic file content, a standard hex viewer, and a wide range of customized displays for interpreted complex file structures that help you understand the purpose of a file. It also supports generation of OpenSBI advanced file parameters, with FileAlyzer you can find the right attributes to write your own optimized malware file signatures! Files as you see them do often contain more than the visible content, through so-called alternate data streams. FileAlyzer makes the additional information in these streams visible through a list of streams associated with the current file, and a basic hex viewer. Sometimes, malware attaches itself as a custom stream to legit files, and can be identified here. Android apps are actually zip archives that include the app code and many resources and configuration files. FileAlyzer will display a few app properties. -
21
Binary Ninja
Binary Ninja
Binary Ninja is an interactive disassembler, decompiler, and binary analysis platform for reverse engineers, malware analysts, vulnerability researchers, and software developers that runs on Windows, macOS, and Linux. Disassemble executables and libraries from multiple formats, platforms, and architectures. Decompile code to C or BNIL for any supported architecture, including your own. Automate analysis with C++, Python, and Rust APIs from inside or outside the UI. Visualize control flow and navigate through cross-references interactively. Name variables and functions, apply types, create structures, and add comments. Collaborate effortlessly with synchronized commits using our Enterprise product. Our built-in decompiler works with all of our officially supported architectures at one price and builds on a powerful family of ILs called BNIL. In fact, not just our architectures, but even community architectures can produce amazing decompilation.Starting Price: $299 one-time payment -
22
AhnLab Xcanner
AhnLab
It is difficult to apply the latest security patch to various fixed function systems, such as Industrial Control Systems (ICS), Point of Sales (POS) Systems, KIOSKs, and ATMs, due to their sensitivity and outdated OS. This leaves them vulnerable to malware infection. As such these systems are placed in air-gapped network or low bandwidth network environments, which are designed to perform only set processes with bare minimum system requirements, it is often impossible to perform engine updates, real-time detection, and remediation with security programs built for PC environment. AhnLab Xcanner enables users to set scan and repair options according to each operating environment and provides minimal clashes with pre-installed security agents. Due to its user-friendly interface, on-site workers and facility managers with zero security knowledge can also easily respond to malware. -
23
ANY.RUN
ANY.RUN
ANY.RUN is an online interactive sandbox for DFIR/SOC investigations. The service gives access to fast malware analysis and detection of cybersecurity threats. The effectiveness of the solution has been proven by over 500,000 active users who find new threats with ANY.RUN daily. ANY.RUN provides an interactive sandbox for malware analysis, offering deep visibility into threat behavior in a secure, cloud-based environment with Windows, Linux, and Android support. It helps SOC teams accelerate monitoring, triage, DFIR, and threat hunting — enabling them to analyze more threats in a team and process more alerts in less time. Learn more at ANY.RUN's website. -
24
Kata Containers
Kata Containers
Kata Containers is Apache 2 licensed software consisting of two main components: the Kata agent, and the Kata Containerd shim v2 runtime. It also packages a Linux kernel and versions of QEMU, Cloud Hypervisor and Firecracker hypervisors. Kata Containers are as light and fast as containers and integrate with the container management layers—including popular orchestration tools such as Docker and Kubernetes (k8s)—while also delivering the security advantages of VMs. Kata Containers supports Linux (host and guest) for now. On the host side, we have installation instructions for several popular distributions. We also have out-of-the-box support for Clear Linux, Fedora, and CentOS 7 rootfs images through the OSBuilder which can also be used to roll your own guest images. -
25
PT MultiScanner
Positive Technologies
PT MultiScanner provides multiple levels of anti-malware protection to detect and block infections on corporate infrastructure, uncover hidden threats, and facilitate investigation of malware-related security incidents. Counting on the same antivirus vendor to be right every time? Draw on the best anti-malware vendors and Positive Technologies expertise instead. Extensive integration support and scalability make PT MultiScanner the right choice for both startups and the largest corporations. Suspicious objects are scanned with multiple anti-malware engines, static analysis, and Positive Technologies reputation lists. The solution supports scanning of files and archives, including recursively compressed ones. As a result, PT MultiScanner can spot and block malware far more effectively than any one method used in isolation. -
26
ReversingLabs
ReversingLabs
ReversingLabs is a software supply chain security platform that helps organizations identify hidden threats within software components. It uses AI-driven binary analysis to detect malware, tampering, secrets, and other active threats that traditional tools often miss. ReversingLabs analyzes first-party, open-source, and third-party software to provide complete visibility into software risk. Its flagship solution, Spectra Assure®, identifies security issues in final builds before release. The platform leverages one of the world’s largest threat intelligence repositories to improve accuracy and reduce false positives. ReversingLabs helps organizations move from reactive threat detection to proactive risk management. It delivers trusted insights that strengthen software trust and security operations. -
27
odix
odix
odix’s patented technology disarms malicious code from files. Our concept is simple, instead of trying to detect the malware, odix generates a malware free copy of the file to the user. Total protection from known and unknown threats delivered to corporate network by incoming files. odix’s malware prevention solutions are based on its Deep File Inspection and TrueCDR™ patented technology. The algorithms provide new detection-less approach against File-Based attacks. The core CDR (Content Disarm and Reconstructions) process focuses on verifying the validity of the file structure on the binary level and disarms both known and unknown threats. This is very different from anti-virus and sandbox methods that scan for threats, detect a subset of malware and block files. With CDR, all malware, including zero-days, are prevented and the user gets a safe copy of the originally infected file. -
28
QFlow
Quarkslab
QFlow is an advance malware detection and analysis platform to reduce the risk of infection during file transfers. QFlow offers comprehensive detection methods and the customization and automation of processing chains to meet specific needs. QFlow integrates a suite of tools that allow advanced analysis of potentially malicious files: commercial antiviruses, commercial sandboxes, open source tools optimized with Quarkslab's expertise. The deployment modes offered, as well as the strict security requirements that apply to the solution, reduce the risk of data leakage. Use Cases: - detection of malware in files and URLs - advanced threat analysis for security engineers - simplified integration into IT infrastructure or business application chains via ICAP or APIs - removable device security through white stations Analysis: - Static analysis (4 AVs) - Dynamic analysis (VMRay) - Morphological analysis (Binary analysis by Cyber Detect's GORILLE) -
29
FileScan.IO
FileScan GmbH
FileScan.IO is a next-gen malware analysis platform with the following emphasis: - Providing rapid and in-depth threat analysis services capable of massive processing - Focus on Indicator-of-Compromise (IOC) extraction and actionable context Key Benefits - Perform detection and IOC extraction for all common files in a single platform - Rapidly identify threats, their capabilities and update your security systems - Search your corporate network for compromised endpoints - Analyze files at scale without actually executing them - Easy reporting for entry level analysts and executive summary - Easy deployment and maintenance We offer a free community service which is a free malware analysis service that offers rapid in-depth file assessments, threat intelligence and indicator of compromise (IOCs) extraction for a wide range of executable files, documents and scripts. -
30
Secure Malware Analytics (formerly Threat Grid) combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware. With a robust, context-rich malware knowledge base, you will understand what malware is doing, or attempting to do, how large a threat it poses, and how to defend against it. Secure Malware Analytics rapidly analyzes files and suspicious behavior across your environment. Your security teams get context-rich malware analytics and threat intelligence, so they’re armed with insight into what a file is doing and can quickly respond to threats. Secure Malware Analytics analyzes the behavior of a file against millions of samples and billions of malware artifacts. Secure Malware Analytics identifies key behavioral indicators of malware and their associated campaigns. Take advantage of Secure Malware Analytics's robust search capabilities, correlations, and detailed static and dynamic analyses.
-
31
Symantec Content Analysis
Broadcom
Symantec Content Analysis automatically escalates and brokers potential zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging Symantec ProxySG, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs. Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like ProxySG, messaging gateway, or other tools is delivered to Content Analysis for deep inspection, interrogation, analysis and ultimately blocking, if deemed malicious. Recent enhancements to Content Analysis strengthens this platform even further. -
32
NVIDIA GPU-Optimized AMI
Amazon
The NVIDIA GPU-Optimized AMI is a virtual machine image for accelerating your GPU accelerated Machine Learning, Deep Learning, Data Science and HPC workloads. Using this AMI, you can spin up a GPU-accelerated EC2 VM instance in minutes with a pre-installed Ubuntu OS, GPU driver, Docker and NVIDIA container toolkit. This AMI provides easy access to NVIDIA's NGC Catalog, a hub for GPU-optimized software, for pulling & running performance-tuned, tested, and NVIDIA certified docker containers. The NGC catalog provides free access to containerized AI, Data Science, and HPC applications, pre-trained models, AI SDKs and other resources to enable data scientists, developers, and researchers to focus on building and deploying solutions. This GPU-optimized AMI is free with an option to purchase enterprise support offered through NVIDIA AI Enterprise. For how to get support for this AMI, scroll down to 'Support Information'Starting Price: $3.06 per hour -
33
Cloudxray
Cloudnosys
CloudXray is a cloud workload scanning solution that operates in two deployment modes; basic for misconfiguration detection and advanced for full malware, OS vulnerability, and misconfiguration scanning. The architecture consists of an orchestrator deployed in a single region and distributed scanners covering all discovered regions, making it fully compatible with both AWS and GCP environments. It uses an agentless approach to inspect workloads and volumes across your cloud account for malware, CVEs, and policy deviations. The solution provisions scanning instances on demand, integrates via roles and APIs, and provides continuous coverage of cloud resources without requiring persistent agents. CloudXray supports rapid deployment and is optimized for scalable, multi-region cloud workloads. It is designed to help organizations maintain a secure posture across compute instances, storage volumes, and OS layers by combining configuration assessment, vulnerability detection, and more. -
34
Palo Alto Networks WildFire
Palo Alto Networks
WildFire® utilizes near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats, keeping your organization protected. Access advanced file analysis capabilities to secure applications like web portals, integrate with SOAR tools, and more. Incorporate WildFire’s unique malware analysis capabilities spanning multiple threat vectors resulting in consistent security outcomes across your organization via an API. Choose flexible file submission and query volumes as needed without requiring a next-generation firewall. Leverage industry-leading advanced analysis and prevention engine capabilities, regional cloud deployments, & unique network effect. WildFire combines machine learning, dynamic and static analysis, and a custom-built analysis environment to discover even the most sophisticated threats across multiple stages and attack vectors. -
35
VMRay
VMRay
At VMRay, we provide enterprises and technology partners worldwide with best-in-class, scalable, automated malware analysis and detection solutions that greatly reduce their exposure to malware-related threats, attacks and vulnerabilities. -
36
Red Hat Enterprise Linux
Red Hat
Red Hat Enterprise Linux is an enterprise Linux operating system, certified on hundreds of clouds and with thousands of vendors. Red Hat Enterprise Linux provides a consistent foundation across environments and the tools needed to deliver services and workloads faster for any application. Red Hat Enterprise Linux reduces deployment friction and costs while speeding time to value for critical workloads, enabling development and operations teams to innovate together in any environment. Red Hat Enterprise Linux extends your hybrid cloud infrastructure to the edge—across hundreds of thousands of nodes all over the world. Create edge-optimized OS images, minimize workload interruptions caused by OS updates, transfer system updates more efficiently, and have confidence in automatic health checks and rollbacks. Run purpose-built command line utilities to automate many inventory and remediation steps associated with upgrading your subscription or migrating from another Linux distro.Starting Price: $99 one-time payment -
37
VFind Security ToolKit
CyberSoft
The VFind Security ToolKit (VSTK) is a suite of four powerful network, and computer, anti-malware utilities that provide flexible and uncompromising computer anti-malware protection. The VFind™ Security ToolKit (VSTK) is a suite of four powerful network and computer anti-malware utilities, that provide flexible and uncompromising computer anti-malware protection. CIT: Is a fantastic anti-malware security tool that has multiple uses. It reports on all files that have been removed, added, modified or duplicated. It can tighten baseline configuration control down to a single bit. It can also be used with surgical precision on an entire system or single file. The CIT tool produces a database of cryptographic hash values for every file it is directed to manage. Besides its use in anti-virus protection, the UAD tool is built for making identification based upon direct inspection of the data. It makes no assumptions about the file’s contents based upon the file’s name.Starting Price: $1035 one-time payment -
38
Falcon Sandbox
CrowdStrike
Falcon Sandbox performs deep analysis of evasive and unknown threats, enriches the results with threat intelligence and delivers actionable indicators of compromise (IOCs), enabling your security team to better understand sophisticated malware attacks and strengthen their defenses. Unique hybrid analysis technology detects unknown and zero-day exploits while defeating evasive malware. Uncover the full attack lifecycle with in-depth insight into all file, network, memory and process activity. Save time and make all security teams more effective with easy-to-understand reports, actionable IOCs and seamless integration. The most sophisticated analysis is required to uncover today’s evasive and advanced malware. Falcon Sandbox’s Hybrid Analysis technology exposes hidden behavior, defeats evasive malware and delivers more IOCs, to improve the effectiveness of the entire security infrastructure. -
39
BitNinja
BitNinja.com
BitNinja provides 3E Linux server protection for large hosting providers and small businesses equally. Effective because of our unique Defense Network that uses the power of the Ninja Community. Every BitNinja-protected server worldwide shares attack information with each other, resulting in a more intelligent and stronger protection shield by every single assault. Effortless because it is fast and easy to install, so your server protection is up and running in no time. It requires no maintenance, just keep running in the background and protecting your and your customer’s servers while you can concentrate on other aspects of your business with peace of mind. Enjoyable because you can take joy in the benefits of BitNinja, like the increased server capacity caused by the significant drop in the server load. Furthermore, you can easily manage all the modules and features on the unified dashboard and check how the the software catches malicious traffic in real-time.Starting Price: $10 per server -
40
PilarOS
PilarOS
Enhanced, manageable and secure Android Mobile OS. PilarOS, AKA TRDROIDTM, is ARDIC’s industrial Android distro with extended security and manageability framework over 1800 new API’s build on AndroidTM Open Source. AFEX adds manageability to the OS. Additional layers provide device, applications, connection and data security. From kernel to cloud level for industrial grade, secure, manageable, scaleable services. It won’t let no monkey business on your device; secures connection, applications, USB ports, mics and cameras. Define the required configuration and push it to all your devices. Install/uninstall/disable/force applications on your devices remotely. Access all your devices on a single admin panel, monitor and manage them all or one by one. PilarOS is not just for smart phones, but also for any purpose smart devices, Internet of things, industrial IoT devices. -
41
4Pane
4Pane
4Pane is a multi-pane, detailed-list file manager for Linux. It is designed to be fully featured without the bloat and aims for speed rather than visual effects. In addition to standard file manager things, it offers multiple undo and redo of most operations (including deletions), archive management including 'virtual browsing' inside archives, multiple renaming/duplication of files, a terminal emulator, and user-defined tools. As you can see from the Screenshots its display is split into a left directory tree-view, and a right detailed-list view which by default shows both files and directories. There are normally two of these twin panes displayed (thus the name) but this, and almost everything else, can be configured to suit your needs. It has been built and tested on all the main Linux distros, using both current and older versions. Though it has a gtk-style appearance, it's not tied to any particular desktop.Starting Price: Free -
42
VIPRE ThreatAnalyzer
VIPRE Security Group
VIPRE ThreatAnalyzer is a powerful dynamic malware analysis sandbox that helps you stay ahead of cyber threats. It lets you safely uncover how malware could impact your organization, so you can respond faster and smarter. Today’s most dangerous attacks often hide in legitimate-looking files—like executables, PDFs, or Microsoft Office documents—waiting for one wrong click to cause chaos, disrupt operations, and rack up financial damage. ThreatAnalyzer intercepts suspicious files, including ransomware and zero-day threats, and detonates them in a secure sandbox environment. Its machine-learning engine analyzes the threats, providing valuable insights into how attacks work, which systems are at risk, and how to strengthen defenses. Get inside the mind of attackers without compromising your network. With VIPRE ThreatAnalyzer, you’ll gain the knowledge to outsmart cybercriminals before they strike.Starting Price: $5400/year for 5q/day -
43
Cloud-Delivered Security Services
Palo Alto Networks
Palo Alto Networks Cloud-Delivered Security Services provide a comprehensive, integrated cloud security solution that protects users, applications, devices, and data across all locations. Powered by Precision AI™ and backed by the Unit 42® Threat Research team, these services analyze real network traffic in real time to stop threats such as phishing, malware, ransomware, and DNS hijacking. Key offerings include Advanced Threat Prevention, Advanced WildFire malware analysis, and Advanced DNS Security, which deliver industry-leading protection against known and unknown attacks. The platform also secures IoT devices with a zero trust model and controls SaaS application usage with NG-CASB. AI Access Security ensures safe use of generative AI apps with access control and data protection. Together, these services leverage a global cloud infrastructure to scale protection and prevent attacks faster than any other solution. -
44
Jotti
Jotti
Jotti's malware scan is a free service that lets you scan suspicious files with several anti-virus programs. You can submit up to 5 files at the same time. There is a 250MB limit per file. Please be aware that no security solution offers 100% protection, not even when it uses several anti-virus engines. All files are shared with anti-virus companies so detection accuracy of their anti-virus products can be improved. We are not interested in names, addresses, or other information providing insight into the identities of our visitors, but we do log and use some of the data you provide. We recognize that privacy is important and we want you to completely understand what happens with the information you send to us. We store files you send in for scanning and share these with anti-malware companies. We do this to help anti-malware companies improve the detection accuracy of their security products. We treat your files confidentially. -
45
Zemana AntiMalware
Zemana
Scan your PC in fast and effective way for malware, spyware, virus detection and removal. Detects and removes annoying browser add-on's, adware, unwanted apps and toolbar and any type of malware on your PC. We are developing this product based on your feedback. Don't let malware take away your PC! Zemana is a cyber-security company that keeps you safe from identity theft, credit card fraud, ransomware and other dangers of the online world. This is a privately held company, formed in 2007 by three college graduates. They wanted to offer more refined security solutions because at that time there were no products on the market that could defeat the rapidly growing level of new hacking variants. This is how our pioneer product Zemana AntiLogger came to life. Instead of just updating a virus database with known virus variants, Zemana AntiLogger was based on behavioral characteristics, so any unexpected and suspicious activity on a computer was blocked automatically.Starting Price: $24.95 per year -
46
DistroScale
DistroScale
With the DistroScale platform, you can immediately take advantage of the massive consumer shift to video–without investing in infrastructure. We provide easy-to-use tools for every part of the process, including video creation, proprietary player, hosting, and monetization. Our proprietary infrastructure engages 250 million users on platforms that include desktop, social, mobile, and OTT. We deliver the reach and scalability you need to grow revenues and connect with your ideal audiences. Find audiences across specific interests, geographies, and demographic categories. Boost engagement with customized video experiences that capture their attention. Control your campaigns and get total transparency via reports and analytics. -
47
OpenMandriva
OpenMandriva
OpenMandriva Lx is a unique and independent distribution and direct descendant of Mandriva Linux. The OpenMandriva Association's goal is to develop a pragmatic distribution that provides the best user experience for everyone, from newbies to developers. We will achieve our objectives for the best balance between the most modern features and stability. Our roots are in Mandrake and its traditions, we are a worldwide community of people who are passionate about free software working together and take our technical and strategic decisions in a collaborative manner. We do not just build a Linux distro, we exchange knowledge and make new friends. Welcome to OpenMandriva Community! Click here to know who are us and what we are doing. A free Desktop Operating System which aims to stimulate and interest first time and advanced users alike. It has the breadth and depth of an advanced system but is designed to be simple and straightforward in use. -
48
AWS Deep Learning AMIs
Amazon
AWS Deep Learning AMIs (DLAMI) provides ML practitioners and researchers with a curated and secure set of frameworks, dependencies, and tools to accelerate deep learning in the cloud. Built for Amazon Linux and Ubuntu, Amazon Machine Images (AMIs) come preconfigured with TensorFlow, PyTorch, Apache MXNet, Chainer, Microsoft Cognitive Toolkit (CNTK), Gluon, Horovod, and Keras, allowing you to quickly deploy and run these frameworks and tools at scale. Develop advanced ML models at scale to develop autonomous vehicle (AV) technology safely by validating models with millions of supported virtual tests. Accelerate the installation and configuration of AWS instances, and speed up experimentation and evaluation with up-to-date frameworks and libraries, including Hugging Face Transformers. Use advanced analytics, ML, and deep learning capabilities to identify trends and make predictions from raw, disparate health data. -
49
Deep Discovery Inspector
Trend Micro
Deep Discovery Inspector is available as a physical or virtual network appliance. It’s designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches. Organizations are increasingly becoming victims of targeted ransomware when advanced malware bypasses traditional security, encrypts data, and demands payment to release the data. Deep Discovery Inspector uses known and unknown patterns and reputation analysis to detect the latest ransomware attacks, including WannaCry. The customized sandbox detects mass file modifications, encryption behavior, and modifications to backup and restore processes. Security professionals are flooded with threat data coming from numerous sources. Trend Micro™ XDR for Networks helps prioritize threats and provide visibility into an attack. -
50
xCAT
xCAT
xCAT (Extreme Cloud Administration Toolkit) is an open source tool designed to automate the deployment, scaling, and management of bare metal servers and virtual machines. It offers comprehensive management capabilities for high-performance computing clusters, render farms, grids, web farms, online gaming infrastructures, clouds, and data centers. xCAT provides an extensible framework based on years of system administration best practices, enabling administrators to discover hardware servers, execute remote system management, provision operating systems on physical or virtual machines in both disk and diskless modes, install and configure user applications, and perform parallel system management. The toolkit supports various operating systems, including Red Hat, Ubuntu, SUSE, and CentOS, and is compatible with architectures such as ppc64le, x86_64, and ppc64. It integrates with management protocols like IPMI, HMC, FSP, and OpenBMC, facilitating remote console access.Starting Price: Free