Security Operations

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Explore 1726 curated cybersecurity tools, with 15,161 visitors searching for solutions

The Sleuth Kit & Autopsy Logo

Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.

0
TestDisk and PhotoRec Logo

TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.

0
ScratchABit Logo

Interactive incremental disassembler with data/control flow analysis capabilities.

0
Krakatau Logo

A Java bytecode assembler and disassembler toolkit that converts classfiles to human-readable format and provides decompilation capabilities for reverse engineering Java applications.

0
Mod_Rewrite for Red Team Infrastructure Logo

A powerful tool for hiding the true location of your Teamserver, evading detection from Incident Response, redirecting users, blocking specific IP addresses, and managing Malleable C2 traffic in Red Team engagements.

0
Invalid URI Redirection with Apache mod_rewrite Logo

A tool that uses Apache mod_rewrite to redirect invalid URIs to a specified URL

0
stegextract Logo

Stegextract is a Bash script that extracts hidden files and strings from images, supporting PNG, JPG, and GIF formats.

0
libesedb Logo

A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.

0
Red Teaming Toolkit Logo

A comprehensive repository of open-source security tools organized by attack phases for red team operations, adversary simulation, and threat hunting purposes.

0
OWASP Honeypot Logo

An open-source Python software for creating honeypots and honeynets securely.

0
FastFinder Logo

Fast suspicious file finder for threat hunting and live forensics.

0
Elastichoney Logo

A simple Elasticsearch honeypot to catch attackers exploiting RCE vulnerabilities.

0
Rifiuti2 Logo

Tool for analyzing Windows Recycle Bin INFO2 file

0
Rastrea2r Logo

A multi-platform open source tool for triaging suspect systems and hunting for Indicators of Compromise (IOCs) across thousands of endpoints.

0
SmashTheStack Wargaming Network Logo

A wargaming network for penetration testers to practice their skills in a realistic environment.

0
CrackMapExec Logo

A post-exploitation tool for pentesting Active Directory

0
AWS pwn Logo

A collection of Python scripts for conducting penetration testing activities against Amazon Web Services (AWS) environments.

0
SNARE Logo

A web application honeypot sensor attracting malicious traffic from the Internet

0
JD-GUI Logo

JD-GUI is a graphical Java decompiler that reconstructs and displays source code from compiled ".class" files for reverse engineering and code analysis purposes.

0
Gray Hat Hacking v6 Lab 29 Logo

A hands-on cybersecurity laboratory environment for Gray Hat Hacking Chapter 29 that creates virtualized Docker and Kali Linux machines using Terraform for practical security training exercises.

0
Red Teaming for Pacific Rim CCDC 2016 Logo

Insights on Red Teaming for Pacific Rim CCDC 2016 competition, focusing on preparation, operations plan, and automation.

0
DVWA - Brute Force (High Level) - Anti-CSRF Tokens Logo

A guide to brute forcing DVWA on the high security level with anti-CSRF tokens

0
APT-Hunter Logo

A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.

0
OWASP Damn Vulnerable Web Sockets (DVWS) Logo

A deliberately vulnerable web application that uses WebSocket communication to provide a training environment for learning about WebSocket-related security vulnerabilities.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Security Operations Tools - FAQ

Common questions about Security Operations tools including selection guides, pricing, and comparisons.

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Have more questions? Browse our categories or search for specific tools.