Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Browse 1,895 security operations tools
A simple Telnet honeypot program that logs login attempts and credentials from botnet attacks, specifically designed to track Mirai botnet activity.
A tool that enables Yara rule execution against compressed malware samples, supporting GZip, BZip2, and LZMA formats without manual decompression.
Automatic analysis of malware behavior using machine learning.
Official repository of YARA rules for threat detection and hunting
hpfeeds is a lightweight authenticated publish-subscribe protocol with Python 3 compatible broker and client.
A Mac OS X code injection library that enables copying code into target processes and remotely executing it through new thread creation.
A modular web application honeypot framework with automation and logging capabilities.
HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.
A Python script that detects and removes Thinkst Canary Tokens from files using signature-based detection methods.
ELAT (Event Log Analysis Tool) is a tool that helps in analyzing Windows event logs for malware detection.
A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.
A multi-platform open source tool for triaging suspect systems and hunting for Indicators of Compromise (IOCs) across thousands of endpoints.
A recognition framework for identifying products, services, operating systems, and hardware by matching fingerprints against network probes.
A virtual machine with numerous security vulnerabilities for testing exploits with Metasploit.
A unified repository for different Metasploit Framework payloads.
An open source repository of plugins for Rapid7 InsightConnect that enables security orchestration and automation through integrations with various security tools and services.
Hackazon is a vulnerable web application storefront designed for security professionals to practice testing modern web technologies and identifying common vulnerabilities.
A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.
A command-line utility and Python package for mounting and unmounting various disk image formats with support for different volume systems and filesystems.
Linux packet crafting tool for testing IDS/IPS and creating attack signatures.
A modern tool for Windows kernel exploration and observability with a focus on security.
A high-interaction honeypot solution for detecting and analyzing SMB-based attacks
A repository containing material for Android greybox fuzzing with AFL++ Frida mode
1895 tools across 9 specializations · 1138 free, 757 commercial
Cyber Range Training
Cyber Range Training platforms and simulation environments for hands-on cybersecurity training and incident response exercises.
Digital Forensics and Incident Response
Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.
Extended Detection and Response
Extended Detection and Response (XDR) platforms that integrate multiple security products for unified threat detection and response across endpoints, networks, and cloud.
Common questions about Security Operations tools, selection guides, pricing, and comparisons.
SIEM (Security Information and Event Management) collects, correlates, and analyzes security logs from across your environment to detect threats. SOAR (Security Orchestration, Automation and Response) automates incident response workflows and playbooks. XDR (Extended Detection and Response) integrates detection across endpoints, network, cloud, and email in a unified platform. Many organizations use SIEM for compliance and broad visibility, XDR for detection, and SOAR for response automation.
It depends on your requirements. XDR provides superior detection by correlating telemetry across multiple security layers. However, SIEM is still needed if you have compliance requirements for long-term log retention, need to ingest logs from non-security sources (applications, databases), or want custom correlation rules. Many organizations are consolidating from SIEM to XDR for detection while keeping SIEM for compliance and log management.
MDR (Managed Detection and Response) provides 24/7 threat monitoring, detection, and response delivered as a managed service. Choose MDR if: your team is too small to staff a 24/7 SOC (typically requires 8-12 analysts), you lack threat hunting expertise, or you need rapid security operations maturity. Build in-house when you need full control over detection logic, have unique threat models, or have the budget for a dedicated security operations team.
DFIR (Digital Forensics and Incident Response) tools help investigate security incidents by collecting and analyzing evidence: disk images, memory dumps, network captures, and log artifacts. You need DFIR capabilities when responding to confirmed breaches, conducting malware analysis, supporting legal proceedings, or performing proactive threat hunting. Many organizations outsource DFIR to specialized incident response firms.