Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Browse 1,895 security operations tools
msticpy is a Python library for InfoSec investigation and threat hunting in Jupyter Notebooks, providing data querying, threat intelligence enrichment, analysis capabilities, and interactive visualizations.
A .NET wrapper for libyara that provides a simplified API for developing tools in C# and PowerShell.
A portable Rust-based tool for acquiring volatile memory from Linux systems without requiring prior knowledge of the target OS distribution or kernel.
A command-line tool that visually displays YARA rule matches, regex matches, and hex patterns in binary data with colored output and configurable context bytes.
A comprehensive collection of free online laboratories and platforms for practicing penetration testing, CTF challenges, and cybersecurity skills development.
A webapp for displaying statistics about your kippo SSH honeypot.
A command-line tool for analyzing and extracting detailed information from Windows Portable Executable (PE) files.
A payload creation framework for generating and executing C# code payloads with anti-evasion capabilities for offensive security operations.
Fake SSH server that sends push notifications for login attempts
HackTheArch is an open-source Ruby on Rails-based scoring server platform designed for hosting and managing Cyber Capture the Flag competitions with web-based problem management and hint systems.
A digital forensics tool that extracts and analyzes Windows AppCompat and AmCache registry data for enterprise-scale forensic investigations.
Beelzebub is an advanced honeypot framework for detecting and analyzing cyber attacks, with integration options for OpenAI GPT-3 and deployment on Kubernetes using Helm.
FLOSS is a static analysis tool that automatically extracts and deobfuscates hidden strings from malware binaries using advanced analysis techniques.
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
A simple framework for extracting actionable data from Android malware
Low-interaction VNC honeypot for logging responses to a static VNC Auth challenge.
A low-interaction SSH honeypot tool for recording authentication attempts.
High-interaction SSH honeypot for logging SSH proxy with ongoing development.
Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.
Python script to parse macOS MRU plist files into human-friendly format
Dump iOS Frequent Locations from StateModel#.archive files.
A digital forensics tool that extracts and exports location database contents from iOS and macOS devices in KML or CSV formats.
A malware/botnet analysis framework with a focus on network analysis and process comparison.
Tool for visualizing correspondences between YARA ruleset and samples
1895 tools across 9 specializations · 1138 free, 757 commercial
Cyber Range Training
Cyber Range Training platforms and simulation environments for hands-on cybersecurity training and incident response exercises.
Digital Forensics and Incident Response
Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.
Extended Detection and Response
Extended Detection and Response (XDR) platforms that integrate multiple security products for unified threat detection and response across endpoints, networks, and cloud.
Common questions about Security Operations tools, selection guides, pricing, and comparisons.
SIEM (Security Information and Event Management) collects, correlates, and analyzes security logs from across your environment to detect threats. SOAR (Security Orchestration, Automation and Response) automates incident response workflows and playbooks. XDR (Extended Detection and Response) integrates detection across endpoints, network, cloud, and email in a unified platform. Many organizations use SIEM for compliance and broad visibility, XDR for detection, and SOAR for response automation.
It depends on your requirements. XDR provides superior detection by correlating telemetry across multiple security layers. However, SIEM is still needed if you have compliance requirements for long-term log retention, need to ingest logs from non-security sources (applications, databases), or want custom correlation rules. Many organizations are consolidating from SIEM to XDR for detection while keeping SIEM for compliance and log management.
MDR (Managed Detection and Response) provides 24/7 threat monitoring, detection, and response delivered as a managed service. Choose MDR if: your team is too small to staff a 24/7 SOC (typically requires 8-12 analysts), you lack threat hunting expertise, or you need rapid security operations maturity. Build in-house when you need full control over detection logic, have unique threat models, or have the budget for a dedicated security operations team.
DFIR (Digital Forensics and Incident Response) tools help investigate security incidents by collecting and analyzing evidence: disk images, memory dumps, network captures, and log artifacts. You need DFIR capabilities when responding to confirmed breaches, conducting malware analysis, supporting legal proceedings, or performing proactive threat hunting. Many organizations outsource DFIR to specialized incident response firms.