Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Browse 1,895 security operations tools
SharpEDRChecker scans system components to detect security products and tools.
SharpAppLocker is a C# tool that retrieves AppLocker application control policies from Windows systems, replicating the Get-AppLockerPolicy PowerShell cmdlet functionality.
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.
edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.
AHHHZURE is an automated deployment script that creates vulnerable Azure cloud lab environments for offensive security training and cloud penetration testing practice.
MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.
A command-line utility for extracting human-readable text from binary files.
IRIS-SOAR is a Python-based modular SOAR platform that automates security incident response workflows and integrates with DFIR-IRIS for enhanced digital forensics operations.
Incident response and case management solution for efficient incident response and management.
A library and tools to access and analyze APFS file systems
Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.
A file search and query tool for ops and security experts.
Check if an IP address was used as a Tor relay on a given date.
No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.
Comprehensive digital forensics and incident response platform for law enforcement, corporate, and academic institutions.
A library and tools for accessing and analyzing Linux Logical Volume Manager (LVM) volume system format.
A library to access the Expert Witness Compression Format (EWF) for digital forensics and incident response.
A library and tools to access and manipulate VMware Virtual Disk (VMDK) files.
A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.
Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.
1895 tools across 9 specializations · 1138 free, 757 commercial
Cyber Range Training
Cyber Range Training platforms and simulation environments for hands-on cybersecurity training and incident response exercises.
Digital Forensics and Incident Response
Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.
Extended Detection and Response
Extended Detection and Response (XDR) platforms that integrate multiple security products for unified threat detection and response across endpoints, networks, and cloud.
Common questions about Security Operations tools, selection guides, pricing, and comparisons.
SIEM (Security Information and Event Management) collects, correlates, and analyzes security logs from across your environment to detect threats. SOAR (Security Orchestration, Automation and Response) automates incident response workflows and playbooks. XDR (Extended Detection and Response) integrates detection across endpoints, network, cloud, and email in a unified platform. Many organizations use SIEM for compliance and broad visibility, XDR for detection, and SOAR for response automation.
It depends on your requirements. XDR provides superior detection by correlating telemetry across multiple security layers. However, SIEM is still needed if you have compliance requirements for long-term log retention, need to ingest logs from non-security sources (applications, databases), or want custom correlation rules. Many organizations are consolidating from SIEM to XDR for detection while keeping SIEM for compliance and log management.
MDR (Managed Detection and Response) provides 24/7 threat monitoring, detection, and response delivered as a managed service. Choose MDR if: your team is too small to staff a 24/7 SOC (typically requires 8-12 analysts), you lack threat hunting expertise, or you need rapid security operations maturity. Build in-house when you need full control over detection logic, have unique threat models, or have the budget for a dedicated security operations team.
DFIR (Digital Forensics and Incident Response) tools help investigate security incidents by collecting and analyzing evidence: disk images, memory dumps, network captures, and log artifacts. You need DFIR capabilities when responding to confirmed breaches, conducting malware analysis, supporting legal proceedings, or performing proactive threat hunting. Many organizations outsource DFIR to specialized incident response firms.