Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Security Tools
Browse 40 security tools
Unified API platform for building native integrations across security & IT ops tools.
A tool for analyzing TCP packet traces with color support.
A javascript malware analysis tool with backend code execution.
AI-assisted vulnerability research and advanced offensive cyber tooling firm.
Security data routing platform for connecting security tools to SIEMs
DNS reconnaissance tool checking DNS records, subdomains, and third-party svcs
Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.
Free tools for the CrowdStrike customer community to support their use of the Falcon platform.
Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.
A hybrid honeypot framework that combines low and high interaction honeypots for network security
Standalone SIGMA-based detection tool for EVTX, Auditd, Sysmon for Linux, XML or JSONL/NDJSON Logs.
SALO is a framework that generates synthetic log events for security testing and research without requiring actual infrastructure or triggering real events.
Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.
A Vim syntax-highlighting plugin for YARA rules that supports versions up to v4.3 and provides enhanced code readability for malware analysts.
A Python script that detects and removes Thinkst Canary Tokens from files using signature-based detection methods.
A high-interaction honeypot solution for detecting and analyzing SMB-based attacks
Binkit is a binary analysis tool that merged with DarunGrim and incorporates its analysis algorithms, currently in internal testing before official release.
A framework for creating standardized cybersecurity event schemas in JSON format that enables interoperability across security tools and platforms.
A spam prevention technique using hidden fields to detect and deter spam bots in Laravel applications.
WordPress honeypot tool running in a Docker container for monitoring access attempts.
A Python utility that calculates RSA cryptographic parameters and generates OpenSSL-compatible private keys from prime numbers or modulus/exponent pairs.
A honeypot system designed to detect and analyze potential security threats
A Python 3 tool for analyzing XOR-encrypted data that can guess key lengths and decrypt XOR ciphers based on character frequency analysis.
A multi-threaded, feedback-driven evolutionary fuzzer that uses low-level process monitoring to discover security vulnerabilities in software applications.
Get strategic cybersecurity insights in your inbox