Security Operations

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Explore 1726 curated cybersecurity tools, with 15,161 visitors searching for solutions

WebMax Tools Privacy Encoders / Decoders / Hash Generators Logo

Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.

0
Proxmark 3 Logo

The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.

0
StrangeBee Cortex Logo

Open-source observable analysis engine and companion tool for TheHive platform

0
Honggfuzz Logo

A multi-threaded, feedback-driven evolutionary fuzzer that uses low-level process monitoring to discover security vulnerabilities in software applications.

0
PlumHound Logo

PlumHound is a reporting engine that converts BloodHoundAD's Neo4J queries into operational security reports for analyzing Active Directory vulnerabilities and attack paths.

0
MFTMactime Logo

MFT and USN parser for direct extraction in filesystem timeline format with YARA rule support.

0
Libcrafter Logo

A high-level C++ library for creating and decoding network packets with a Scapy-like interface.

0
HoneyAlarmG2 Logo

A simplified UI for showing honeypot alarms for the DTAG early warning system

0
HoneyUp Logo

Uploader honeypot designed to look like poor website security.

0
Reverse Shell Cheat Sheet Logo

A cheat sheet providing examples of creating reverse shells for penetration testing.

0
Splunk Security Content Logo

Access a repository of Analytic Stories and security guides mapped to industry frameworks, with Splunk searches, machine learning algorithms, and playbooks for threat detection and response.

0
Commix Logo

Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.

0
libfsntfs Logo

A library to access the Windows New Technology File System (NTFS) format with read-only support for NTFS versions 3.0 and 3.1.

0
mitmproxy Logo

mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.

0
Docker HTTP API Emulator Logo

Emulates Docker HTTP API with event logging and AWS deployment script.

0
Telnetlogger Logo

A simple Telnet honeypot program that logs login attempts and credentials from botnet attacks, specifically designed to track Mirai botnet activity.

0
Libnet Logo

An API for constructing and injecting network packets with additional functionality.

0
ezXSS Logo

ezXSS is a testing framework that helps penetration testers and bug bounty hunters identify Cross Site Scripting vulnerabilities, especially blind XSS attacks.

0
WPSploit Logo

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

0
Beagle Logo

Incident response and digital forensics tool for transforming data sources and logs into graphs.

0
DFIR ORC Logo

DFIR ORC Documentation provides detailed instructions for setting up the build environment and deploying the tool.

0
Hardware Security Validation Environment Logo

A hardware security validation toolkit for x86 platforms that provides bootable tools for checking platform configuration registers and managing SecureBoot keys.

0
Miniprint Logo

A honeypot that simulates an exposed networked printer using PJL protocol to capture and log attacker interactions through a virtual filesystem.

0
PEzor Logo

An open-source shellcode and PE packer for creating and managing portable executable files.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Security Operations Tools - FAQ

Common questions about Security Operations tools including selection guides, pricing, and comparisons.

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Have more questions? Browse our categories or search for specific tools.