Security Operations for Open Source
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Open Source
Browse 105 security tools
FEATURED
- Home
- Categories
- Security Operations
- Open Source
USE CASES
Email collection point designed to trap spammers and blacklist IPs.
Non-profit organization supporting the advancement of open source software.
Deception-based breach detection tools including honeypots & canary tokens.
Open-source nonprofit org developing honeypot tools & threat research.
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
SIEM optimization software for Microsoft Sentinel with ML-based tuning
SOC platform for detecting, analyzing, and responding to network anomalies
Open-source SIEM and XDR platform for threat detection and response
Open source XDR platform for threat detection and response across IT layers
DNS reconnaissance tool checking DNS records, subdomains, and third-party svcs
Pattern matching library for strings against large lists of glob patterns
Fast disassembler producing reassemblable assembly code using Datalog
Cloud-native system call and audit log analysis tool based on Wireshark
Open-source log collection, processing, and forwarding tool for log management
Search AI platform with vector database for logs, threat hunting, and AI apps
Distributed search and analytics engine for real-time data storage and retrieval
Searchable repository of Sigma detection rules for threat hunting and SIEM
An open-source framework that enables building and deploying AI security tools
An open-source incident response case management tool
Open source SIEM and XDR platform for real-time threat detection and response
SIEM platform for centralized security visibility and threat detection
Cybersecurity reporting solution that automates and standardizes report generation
Wazuh is an open-source security platform offering unified XDR and SIEM protection for endpoints and cloud workloads, integrating various security functions into a single architecture.