Security Operations

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Explore 1420 curated cybersecurity tools, with 17,495+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
SharpShooter Logo

A payload creation framework for generating and executing C# code payloads with anti-evasion capabilities for offensive security operations.

0
vim-yara Logo

Syntax, indent, and filetype detection for YARA rule files with auto-indenting and error display in quickfix window.

0
Pasithea Logo

A honeypot system that allows you to set up a decoy API to detect and analyze potential security threats.

0
Event Log Explorer Logo

Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.

0
Veles Logo

A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.

0
Otseca Logo

Open source security auditing tool to search and dump system configuration.

0
Hadoop PCAP library Logo

A Hadoop library for reading and querying PCAP files

0
WeirdAAL (AWS Attack Library) Logo

WeirdAAL is an open-source framework that provides tools and libraries for simulating attacks and testing security vulnerabilities in AWS environments.

0
Mastiff Logo

A static analysis framework for extracting key characteristics from various file formats

0
Altoro Mutual Online Banking Logo

Altoro Mutual offers online banking, real estate financing, business credit cards, retirement solutions, and prioritizes privacy and security.

0
Honeyntp Logo

Honeyntp is an NTP honeypot and logging tool that captures NTP packets into a Redis database to detect DDoS attacks and monitor network time protocol traffic.

0
Honeypot for Router Backdoor (TCP-32764) Logo

A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.

0
Metasploit Framework Logo

A powerful penetration testing platform for identifying vulnerabilities and weaknesses in computer systems.

0
go-yara Logo

Go bindings for YARA with installation and build instructions.

0
readpe Logo

A command-line tool for analyzing and extracting detailed information from Windows Portable Executable (PE) files.

0
Breaking and Pwning Apps and Servers on AWS and Azure Logo

A training program that teaches security professionals how to conduct penetration testing and attack simulations against AWS and Azure cloud infrastructure.

0
bap Logo

bap is a webservice honeypot that logs HTTP basic authentication credentials.

0
Bifrozt-ansible Logo

An Ansible role that automates the deployment and management of Bifrozt honeypots for network security monitoring.

0
Go SSH Honeypot Logo

Fake SSH server that sends push notifications for login attempts

0
MicroBurst Logo

A PowerShell toolkit for penetration testing Microsoft Azure environments, providing discovery, configuration auditing, and post-exploitation capabilities.

0
Volatility 3 Logo

A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.

0
PSHunt Logo

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

0
protobuf-inspector Logo

A command-line tool that parses Google Protobuf encoded data without schema definitions and displays the content in a readable, colored format.

0

Security Operations Tools - FAQ

Common questions about Security Operations tools including selection guides, pricing, and comparisons.

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Have more questions? Browse our categories or search for specific tools.