Security Operations

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Explore 1403 curated cybersecurity tools, with 14,626+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

pwnable.kr Logo

A non-commercial wargame site offering pwn challenges related to system exploitation with different difficulty levels.

0
Workshop Hacking Bluetooth Smart locks Logo

A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.

0
LockBoxx Logo

Introduction to using GScript for Red Teams

0
State of Security Logo

Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

0
Yara_fn IDAPython script Logo

An IDAPython script that generates YARA rules for basic blocks of the current function in IDA Pro, with automatic masking of relocation bytes and optional validation against file segments.

0
Linux Soft Exploit Suggester Logo

Script to find exploits for vulnerable software packages on Linux systems using an exploit database.

0
PcapXray Logo

A network forensics tool for visualizing packet captures as network diagrams with detailed analysis.

0
sysmon-modular Logo

A Sysmon configuration repository for customizing Microsoft Sysinternals Sysmon configurations with modular setup.

0
Private Yara Rules Repository Logo

A repository of freely usable Yara rules for detection systems, with automated error detection workflows.

0
bro-osquery-module Logo

A module for loading Bro logs as tables in Osquery

0
Belkasoft Logo

Belkasoft offers cybersecurity solutions, training, and tools for businesses, law enforcement, and academia.

0
Project Honey Pot Logo

The Web's Largest Community Tracking Online Fraud & Abuse

0
WAPot Logo

A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic

0
LastActivityView Logo

A tool that collects and displays user activity and system events on a Windows system.

0
Security Response Automation Logo

An automated security response system for Google Cloud that processes Security Command Center findings and executes predefined remediation actions like disk snapshots, IAM revocation, and notifications.

0
HxD Logo

HxD is a freeware hex editor and disk editor with advanced features for editing files, memory, and disks.

0
Binsequencer Logo

Binsequencer automatically generates YARA detection rules by analyzing collections of similar malware samples and identifying common x86 instruction sequences across the corpus.

0
fatt Logo

A script for extracting network metadata and fingerprints such as JA3 and HASSH from packet capture files or live network traffic.

0
pybof Logo

PyBOF is a Python library that enables in-memory loading and execution of Beacon Object Files (BOFs) with support for argument passing and function targeting.

0
BinaryPig Logo

A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.

0
Yara-Unprotect Logo

A collection of Yara rules for detecting malware evasion techniques

0
Krypton Logo

A wargame designed to test your hacking skills and knowledge

0
x8 Logo

x8 is a hidden parameters discovery suite that automatically identifies undocumented parameters in web applications and APIs for security testing purposes.

1
cabextract Logo

Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.

0