Security Operations

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Explore 1419 curated cybersecurity tools, with 17,376+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
InvalidSign Logo

InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.

0
o365recon Logo

A reconnaissance tool that retrieves information from Office 365 and Azure Active Directory using a valid credential.

0
Android Malware Samples Logo

Largest open collection of Android malware samples, with 298 samples and contributions welcome.

0
CloudCopy Logo

CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.

0
SMTP Honeypot Logo

SMTP honeypot tool with configurable response messages, email storage, and automatic information extraction.

0
Datadog Logo

Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.

0
Beelzebub Logo

Beelzebub is an advanced honeypot framework for detecting and analyzing cyber attacks, with integration options for OpenAI GPT-3 and deployment on Kubernetes using Helm.

0
Inspektor Gadget Logo

A collection of tools to debug and inspect Kubernetes resources and applications, managing eBPF programs execution and mapping kernel primitives to Kubernetes resources.

0
Intezer Yara Rules Logo

A powerful tool for detecting and identifying malware using a rule-based system.

0
Revoke-Obfuscation v1.0 Logo

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.

0
Hackazon Logo

Hackazon is a vulnerable web application storefront designed for security professionals to practice testing modern web technologies and identifying common vulnerabilities.

0
iMISP Logo

A honeypot designed to detect and analyze malicious activities in instant messaging platforms.

0
MozDef Logo

Automate security incident handling and facilitate real-time activities of incident handlers.

0
Threatpost Logo

Sysreptor offers a customizable reporting solution for penetration testing and red teaming.

0
SentinelOne Singularity Platform Logo

SentinelOne's Singularity Platform is an AI-powered enterprise security platform providing autonomous endpoint, cloud, identity, and data protection through its integrated XDR solution.

0
InsightConnect Plugins Logo

An open source repository of plugins for Rapid7 InsightConnect that enables security orchestration and automation through integrations with various security tools and services.

0
GadgetProbe Logo

A tool for identifying and analyzing Java serialized objects in network traffic

0
Ghidra Software Reverse Engineering Framework Logo

Ghidra is an NSA-developed software reverse engineering framework that provides disassembly, decompilation, and analysis tools for examining compiled code across multiple platforms and processor architectures.

0
Turbinia Logo

Turbinia is an open-source framework for automating the running of common forensic processing tools to help with processing evidence in the Cloud.

0
Hash Extender Logo

Hash Extender is a command-line tool that automates length extension attacks against various hashing algorithms including MD5, SHA-1, SHA-256, and others.

0
Logdissect Logo

Logdissect is a CLI utility and Python library for analyzing log files and other data.

0
USN-Journal-Parser Logo

Python script to parse the NTFS USN Change Journal.

0
Sophos AI YaraML Rules Repository Logo

A tool that generates Yara rules from training data using logistic regression and random forest classifiers.

0
Community Security Analytics (CSA) Logo

A community-driven repository of pre-built security analytics queries and rules for monitoring and detecting threats in Google Cloud environments across various log sources and activity types.

0

Security Operations Tools - FAQ

Common questions about Security Operations tools including selection guides, pricing, and comparisons.

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Have more questions? Browse our categories or search for specific tools.