Security Operations

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Explore 1726 curated cybersecurity tools, with 15,216 visitors searching for solutions

Tracking a stolen code-signing certificate with osquery Logo

Detect signed malware and track stolen code-signing certificates using osquery.

0
Revelo - Javascript Deobfuscator Logo

Revelo is an experimental Javascript deobfuscator tool with features to analyze and deobfuscate Javascript code.

0
GDPatrol Logo

A serverless SOAR framework for AWS GuardDuty that automatically executes configurable response actions based on security findings and threat severity.

0
DIVA Android Logo

DIVA Android is an intentionally vulnerable Android application designed to teach security professionals and developers about mobile application security flaws through hands-on learning.

0
libevt Logo

libevt is a library to access and parse Windows Event Log (EVT) files.

0
Metasploit Payloads Logo

A unified repository for different Metasploit Framework payloads.

0
WinHex Logo

Universal hexadecimal editor for computer forensics, data recovery, and IT security.

0
ILSpy Logo

ILSpy is the open-source .NET assembly browser and decompiler with various decompiler frontends and features.

0
ResourcesExtract Logo

Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files

0
Spam Honeypot Tool Logo

A honeypot tool that simulates an open relay to capture and analyze spam

0
YARA IDA Processor Logo

A tool for processing compiled YARA rules in IDA.

0
DFIR CTF: Precision Widgets of North Dakota Intrusion Logo

A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.

0
THOR Lite Logo

A free, fast, and flexible multi-platform IOC and YARA scanner for Windows, Linux, and macOS.

0
Fargate IR Proof of Concept Logo

A proof of concept for using the SSM Agent in Fargate for incident response

0
Yara Scanner Logo

A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.

0
HonTel Logo

Honeypot for Telnet service with configurable settings.

0
Tweetable Polyglot PNG Logo

Pack up to 3MB of data into a tweetable PNG polyglot file.

0
Morgue Logo

A PHP based web application for managing postmortems with pluggable features.

0
AWS Incident Response Runbook Samples Logo

Template-based incident response runbooks for AWS environments following NIST guidelines to help organizations handle common cloud security incidents.

0
ir-rescue Logo

A set of scripts for collecting forensic data from Windows and Unix systems respecting the order of volatility.

0
traceroute-circl Logo

An extended traceroute tool for CSIRT operators with advanced features.

0
Thinkst Canarytokens Detector and Diffuser/Nullifier Logo

A Python script that detects and removes Thinkst Canary Tokens from files using signature-based detection methods.

0
Android greybox fuzzing with AFL++ Frida mode Logo

A repository containing material for Android greybox fuzzing with AFL++ Frida mode

0
YARA Public YARA rules Logo

A community-maintained repository of YARA rules for detecting and classifying malware based on patterns and characteristics.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Security Operations Tools - FAQ

Common questions about Security Operations tools including selection guides, pricing, and comparisons.

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Have more questions? Browse our categories or search for specific tools.