Security Operations for Api Security

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Api Security

Explore 21 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

AltV6 Logo

AltV6 is a proxy service provider offering residential, datacenter, and IPv6 proxies for web scraping and data collection with global network coverage and rotating IP capabilities.

0
Gospider Logo

A Go-based web spider tool for automated crawling and data collection from web resources across multiple protocols and formats.

0
cariddi Logo

An automated reconnaissance tool that crawls domains to discover URLs and scan for exposed secrets, API keys, and sensitive files during security assessments.

0
CrowdFMS Logo

CrowdFMS is a CrowdStrike framework that automates malware sample collection from VirusTotal using YARA rule-based notifications and the Private API system.

0
AWS Incident Response Investigation of API activity using Athena and notification of actions using EventBridge Logo

An AWS incident response framework that uses Athena to analyze CloudTrail events and EventBridge for notifications to investigate API activity and detect security misconfigurations.

0
x8 Logo

x8 is a hidden parameters discovery suite that automatically identifies undocumented parameters in web applications and APIs for security testing purposes.

1
Hackazon Logo

Hackazon is a vulnerable web application storefront designed for security professionals to practice testing modern web technologies and identifying common vulnerabilities.

0
github-search Logo

A collection of CLI tools and API utilities for searching and filtering GitHub repositories by various criteria including keywords, users, organizations, and repository attributes.

0
aws-summarize-account-activity Logo

A Python tool that analyzes AWS CloudTrail data to summarize IAM principal activities, API calls, regions, IP addresses, and user agents with configurable timeframes and visualization options.

0
hivex Logo

A Windows Registry hive extraction library that provides C API access for reading and writing registry binary files with XML export capabilities.

0
PowerGRR Logo

PowerGRR is a PowerShell API client library that automates GRR (Google Rapid Response) operations for digital forensics and incident response across multiple operating systems.

0
Windows 7 UAC Whitelist Code-Injection Issue Logo

Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

0
SOARCA Logo

SOARCA is an open-source SOAR platform that automates security incident response workflows using standardized CACAOv2 playbooks and multiple integration interfaces.

0
Aptoide Logo

Aptoide is an alternative Android application marketplace that enables APK downloads and metadata retrieval for mobile security research and analysis.

0
CrowdStrike Falcon Orchestrator Logo

A Windows-based workflow automation and case management application that integrates with CrowdStrike Falcon APIs to streamline security operations and incident response processes.

0
Kiterunner Logo

Kiterunner is a tool for lightning-fast traditional content discovery and bruteforcing API endpoints in modern applications.

0
Substation Logo

A cloud-native, event-driven data pipeline toolkit for security teams that processes and routes data across AWS services with custom formatting and API enrichment capabilities.

0
Shuffle Automation Logo

Shuffle Automation is an accessible automation platform that provides workflow automation capabilities for security operations with both self-hosted and cloud deployment options.

0
Leonidas Logo

A framework for executing cloud attacker tactics, techniques, and procedures (TTPs) that can generate APIs, Sigma detection rules, and documentation from YAML-based definitions.

0
GraphSpy Logo

GraphSpy is a browser-based post-exploitation tool for Azure Active Directory and Office 365 environments that enables token management, reconnaissance, and interaction with Microsoft 365 services.

0
TrailBlazer Logo

TrailBlazer analyzes AWS CloudTrail logging behavior by systematically testing API calls across services to determine what gets logged and how it appears in CloudTrail.

0