Loading...

Looking for alternatives to Autonomous Mode? AI-driven autonomous security investigation agent by Legion Security. Browse 36 similar Security Operations tools below, compare features side-by-side, and find the best fit for your security stack.
AI-augmented platform for SOC investigations, threat hunting & IR.
OSINT tool for digital identity investigation across 600+ public sources.
Investigation and case management system for cybersecurity incidents
Browser session recording & forensics for incident investigation & analysis
EDR investigation platform that ingests and analyzes endpoint data
Incident investigation tool for info risks, user activity, and file exposure.
Automated network packet recording and breach investigation tool for IR teams.
Cloud-based bare-metal malware analysis lab for SOC, CERT & CIRT teams.
Email forensic tool for analyzing email headers, body, and attachments.
Email forensics tool for analyzing MIME header fields across 20+ formats.
Forensic email analysis tool for detecting spam, phishing, and email threats.
Professional digital forensics service covering breaches, fraud, and OSINT.
Professional digital forensics services covering computers, mobile, and media.
AI-powered file analysis platform delivering malware verdicts in natural language.
AI-powered malware analysis & threat research platform with chat interface.
Automated DFIR platform for rapid incident investigation and endpoint triage
Blockchain analytics platform for crypto compliance and investigations
Accredited forensic cell site geolocation analysis for criminal investigations.
Professional e-discovery service for ESI identification, collection & review.
Professional digital forensics service for legal & criminal investigations.
Windows-based email forensics tool for evidence recovery and analysis.
Email-focused digital forensics tool for evidence acquisition, analysis & reporting.
OSINT-driven link analysis tool for mapping entity relationships visually.
OSINT tool for investigating cybercrime activity on Telegram.
AI-powered data lake for structured/unstructured data discovery & analysis.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.
BinaryAlert is an open-source serverless AWS pipeline that automatically scans files uploaded to S3 buckets with YARA rules and generates immediate alerts when malware is detected.
Zui is a desktop application for data exploration and analysis that provides drag-and-drop data ingestion, automatic format detection, and interactive querying capabilities for structured and semi-structured data.
Capa is a malware analysis tool that detects capabilities in executable files by analyzing PE, ELF, .NET modules, shellcode, and sandbox reports to identify potential malicious behaviors with ATT&CK framework mapping.
MFT and USN parser for direct extraction in filesystem timeline format with YARA rule support.
A framework for orchestrating forensic collection, processing, and data export.
A tool that uses Plaso to parse forensic artifacts and disk images, creating custom reports for easier analysis.
A reliable end-to-end DFIR solution for boosting cyber incident response and forensics capacity.
Get strategic cybersecurity insights in your inbox