Security Operations

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Explore 1726 curated cybersecurity tools, with 15,216 visitors searching for solutions

ocaml-yara by Elastic Logo

OCaml bindings to the YARA scanning engine for integrating YARA scanning capabilities into OCaml projects

0
Luyten Logo

Java decompiler GUI tool for Procyon under Apache License.

0
Kansa Logo

A modular incident response framework in Powershell that uses Powershell Remoting to collect data for incident response and breach hunts.

0
pghoney Logo

A simple Postgres honey pot inspired by Elastichoney.

0
Grep App Logo

Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

0
PyaraScanner Logo

A multithreaded YARA scanner for incident response or malware zoos.

0
SSH Honeypot Logo

A low-interaction SSH honeypot that logs connection attempts, usernames, and passwords without allowing actual login access.

0
Honeyport Logo

A simpler version of a honeypot that looks for connections from external parties and performs a specific action, usually blacklisting.

0
Polichombr Logo

A collaborative malware analysis framework with various features for automated analysis tasks.

0
OWASP Hackademic Challenges Logo

OWASP Hackademic Challenges is an educational web platform offering 10 realistic vulnerability scenarios for learning information security concepts through hands-on exploitation in a controlled environment.

0
HoneyThing Logo

HoneyThing is a honeypot for Internet of TR-069 things, emulating vulnerabilities and supporting TR-069 protocol.

0
Panther Detections Logo

A collection of detections for Panther SIEM with detailed setup instructions.

0
libsmdev Logo

A library and set of tools for accessing and analyzing storage media devices and partitions for forensic analysis and investigation.

0
sslhaf Logo

Passive SSL client fingerprinting tool using handshake analysis.

0
StegCracker Logo

Steganography brute-force utility with performance issues, deprecated in favor of stegseek.

0
Factual Rules Generator Logo

An open source tool that generates YARA rules from installed software on running operating systems for efficient software identification in digital forensic investigations.

0
Spyre Logo

A simple, self-contained modular host-based IOC scanner for incident responders.

0
honeyssh Logo

Honey-Pod for SSH that logs username and password tries during brute-force attacks.

0
JIMI SOAR Logo

JIMI is a flow-based orchestration automation platform that combines low-code and no-code capabilities for multi-team collaboration across IT, security, and development operations.

0
Infection Monkey Logo

An open-source security tool that simulates network breaches by self-propagating across data centers to test organizational resilience against lateral movement attacks.

0
WebTrap Logo

Create deceptive webpages to deceive and redirect attackers away from real websites by cloning them.

0
Cuckoo-Modified-API Logo

A Python library to interface with a cuckoo-modified instance.

0
Diffy (DEPRECATED) Logo

A deprecated digital forensics tool by Netflix that helped investigators scope compromises across AWS cloud instances by identifying behavioral differences and outliers during security incidents.

0
Ensnare Logo

Ensnare is a Ruby on Rails gem that deploys honey traps and automated responses to detect and interfere with malicious behavior in web applications.

0

Security Operations Tools - FAQ

Common questions about Security Operations tools including selection guides, pricing, and comparisons.

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Have more questions? Browse our categories or search for specific tools.