Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Browse 1,895 security operations tools
A lightweight CTF platform inspired by motherfuckingwebsite.com that provides simple hosting capabilities for cybersecurity competitions with equal-point scoring and minimal setup requirements.
A collection of Mac OS X and iOS forensics resources with a focus on artifact collection and collaboration.
Vulnerable web application for beginners in penetration testing.
A dynamic multi-cloud infrastructure framework that enables rapid deployment of disposable instances pre-loaded with security tools for distributed offensive and defensive security operations.
BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
An IDA Pro plugin that uses YARA rules to automatically detect cryptographic constants and patterns in binary files during reverse engineering analysis.
A utility for splitting packet traces along TCP connection boundaries.
A user-friendly and fast Forensic Analysis tool with features like tagging files and generating preview reports.
Repository of default playbooks and custom functions for Splunk SOAR instances with content migration to Splunk's GitHub.
Migrated Splunk SOAR Connectors to new GitHub organization for better organization and management.
Interactive incremental disassembler with data/control flow analysis capabilities.
A high-level C++ library for creating and decoding network packets with a Scapy-like interface.
DIVA Android is an intentionally vulnerable Android application designed to teach security professionals and developers about mobile application security flaws through hands-on learning.
A set of PHP scripts for practicing LFI, RFI, and CMD injection vulnerabilities.
Companion repository for deploying osquery in a production environment with tailored query packs.
A framework for improving detection strategies and alert efficacy.
A Go-based honeypot that mimics Intel's AMT management service to detect and log exploitation attempts targeting the CVE-2017-5689 firmware vulnerability.
Embeddable Yara library for Java with support for loading rules and scanning data.
OVAA is an intentionally vulnerable Android application that aggregates common platform security vulnerabilities for educational and security testing purposes.
CyLR is a Live Response Collection tool for quickly and securely collecting forensic artifacts from hosts with NTFS file systems.
Export Kubernetes events for observability and alerting purposes with flexible routing options.
A shell script for basic forensic collection of various artefacts from UNIX systems.
1895 tools across 9 specializations · 1138 free, 757 commercial
Cyber Range Training
Cyber Range Training platforms and simulation environments for hands-on cybersecurity training and incident response exercises.
Digital Forensics and Incident Response
Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.
Extended Detection and Response
Extended Detection and Response (XDR) platforms that integrate multiple security products for unified threat detection and response across endpoints, networks, and cloud.
Common questions about Security Operations tools, selection guides, pricing, and comparisons.
SIEM (Security Information and Event Management) collects, correlates, and analyzes security logs from across your environment to detect threats. SOAR (Security Orchestration, Automation and Response) automates incident response workflows and playbooks. XDR (Extended Detection and Response) integrates detection across endpoints, network, cloud, and email in a unified platform. Many organizations use SIEM for compliance and broad visibility, XDR for detection, and SOAR for response automation.
It depends on your requirements. XDR provides superior detection by correlating telemetry across multiple security layers. However, SIEM is still needed if you have compliance requirements for long-term log retention, need to ingest logs from non-security sources (applications, databases), or want custom correlation rules. Many organizations are consolidating from SIEM to XDR for detection while keeping SIEM for compliance and log management.
MDR (Managed Detection and Response) provides 24/7 threat monitoring, detection, and response delivered as a managed service. Choose MDR if: your team is too small to staff a 24/7 SOC (typically requires 8-12 analysts), you lack threat hunting expertise, or you need rapid security operations maturity. Build in-house when you need full control over detection logic, have unique threat models, or have the budget for a dedicated security operations team.
DFIR (Digital Forensics and Incident Response) tools help investigate security incidents by collecting and analyzing evidence: disk images, memory dumps, network captures, and log artifacts. You need DFIR capabilities when responding to confirmed breaches, conducting malware analysis, supporting legal proceedings, or performing proactive threat hunting. Many organizations outsource DFIR to specialized incident response firms.