Security Operations for Windows

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Windows

Explore 81 curated cybersecurity tools, with 15,070 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

Sigma Query Logo

Searchable repository of Sigma detection rules for threat hunting and SIEM

0
Read-Teaming-TTPs Logo

A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.

0
Verisys File Integirty Monitoring Logo

A next-generation file integrity monitoring and change detection system

0
yara_rules Logo

A collection of YARA rules for Windows, Linux, and Other threats.

0
Fibratus Logo

A modern tool for Windows kernel exploration and observability with a focus on security.

0
Vshadow Logo

A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.

0
RegRippy Logo

RegRippy is a modern Python 3 alternative to RegRipper for extracting data from Windows registry hives.

0
LastActivityView Logo

A tool that collects and displays user activity and system events on a Windows system.

0
WindowsSCOPE Logo

A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.

1
Drltrace Logo

Drltrace is a dynamic API calls tracer for Windows and Linux applications.

0
SigThief Logo

SigThief extracts digital signatures from signed PE files and appends them to other files to create invalid signatures for testing Anti-Virus detection mechanisms.

0
SharpAppLocker Logo

SharpAppLocker is a C# tool that retrieves AppLocker application control policies from Windows systems, replicating the Get-AppLockerPolicy PowerShell cmdlet functionality.

0
Windows-Hunting Logo

A repository to aid Windows threat hunters in looking for common artifacts.

0
Donut Logo

A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.

0
Fridump Logo

Fridump is an open source memory dumping tool that uses the Frida framework to extract accessible memory addresses from iOS, Android, and Windows applications for security testing and analysis.

0
ForensicMiner v1.4 Logo

A PowerShell-based DFIR automation tool that streamlines artifact and evidence collection from Windows machines for digital forensic investigations.

0
HackSys Extreme Vulnerable Driver (HEVD) Logo

A Windows kernel driver intentionally designed with various vulnerabilities to help security researchers practice kernel exploitation techniques.

0
LaZagne Project Logo

Open source application for retrieving passwords stored on a local computer with support for various software and platforms.

0
PowerSploit Logo

PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.

0
libregf Logo

A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.

0
Detection Lab Logo

DetectionLab is a pre-configured Windows domain environment with security tooling and logging designed for cybersecurity training and detection capability development.

0
Echotrail Insights Logo

Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.

0
Windows Privilege Escalation Techniques Logo

A list of Windows privilege escalation techniques, categorized and explained in detail.

0
WindowsExploits Logo

A collection of precompiled Windows exploits for privilege escalation.

0