Security Operations

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Explore 1726 curated cybersecurity tools, with 15,216 visitors searching for solutions

Redirect.rules Logo

A dynamic redirect rules generator that creates custom redirect configurations for penetration testing and security assessment scenarios.

0
MultiScanner Logo

A file analysis framework that automates the evaluation of files by running a suite of tools and aggregating the output.

0
YARA-sort Logo

A tool for sorting YARA rules based on metadata.

0
Fernflower Logo

Fernflower is an analytical decompiler for Java with command-line options and support for external classes.

0
Windows EVTX Samples [200 EVTX examples] Logo

Container of 200 Windows EVTX samples for testing detection scripts and training on DFIR.

0
MockSSH Logo

MockSSH is a testing tool that emulates operating systems behind SSH servers to enable automation testing without requiring access to real servers.

0
Portlurker Logo

Port listener / honeypot in Rust with protocol guessing, safe string display and rudimentary SQLite logging.

0
libfwnt Logo

A library for working with Windows NT data types, providing access and manipulation functions.

0
modpot Logo

A modular web application honeypot framework with automation and logging capabilities.

0
wxHexEditor Logo

wxHexEditor is a free cross-platform hex editor and disk editor for editing binary files, disk devices, and logical drives with data manipulation and checksum calculation features.

0
SysmonSearch Logo

SysmonSearch makes event log analysis more effective by aggregating Microsoft Sysmon logs and providing detailed analysis through Elasticsearch and Kibana.

0
de4dot Logo

An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.

0
BeEF Logo

BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.

0
Viper Framework Logo

Binary analysis and management framework for organizing malware and exploit samples.

0
Dshell Logo

An extensible network forensic analysis framework with deep packet analysis and plugin support.

0
Arctic Swallow Logo

A low-interaction honeypot for detecting and analyzing security threats

0
Kerberos Party Tricks Logo

Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.

0
Yara-Rules Repository Logo

Repository of YARA rules for Trellix ATR blogposts and investigations

0
PoshC2 Logo

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

0
OSXCollector Logo

OSXCollector is a forensic evidence collection & analysis toolkit for OSX.

0
MFTECmd Logo

A command-line tool for managing and analyzing Microsoft Forefront TMG and UAG configurations.

0
Aurora Incident Response Logo

Incident Response Documentation tool for tracking findings and tasks.

1
Mquery Logo

Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.

0
iPBD2 - iPhone Backup Decoder and Analyzer Logo

Browse and analyze iPhone/iPad backups with detailed file properties and various viewers.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Security Operations Tools - FAQ

Common questions about Security Operations tools including selection guides, pricing, and comparisons.

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Have more questions? Browse our categories or search for specific tools.