Automation

Explore 762 curated cybersecurity tools, with 15,190 visitors searching for solutions

Docker's Actuary Logo

Docker's Actuary is an automated security assessment tool that checks Docker container deployments against configurable best-practice checklists to ensure production readiness.

0
IAM Floyd Logo

IAM Floyd is a code generation tool that provides a fluent interface for creating AWS IAM policy statements with comprehensive service coverage and CDK integration support.

0
ICSREF Logo

ICSREF is a modular framework that automates reverse engineering of CODESYS industrial control system binaries to identify functions, library calls, and program structures.

0
Catalyst Logo

Catalyst is a SOAR platform that automates alert handling and incident response procedures through ticket management, templates, and playbooks.

0
Rudder Logo

A comprehensive IT infrastructure automation platform for managing hybrid infrastructure through configuration, patch, and security management.

0
JIMI SOAR Logo

JIMI is a flow-based orchestration automation platform that combines low-code and no-code capabilities for multi-team collaboration across IT, security, and development operations.

0
COPS - Collaborative Open Playbook Standard Logo

COPS is a YAML-based schema standard for creating collaborative DFIR playbooks that provide structured guidance for incident response processes.

0
Halogen Logo

Halogen automates the creation of YARA rules based on image files embedded in malicious documents to assist in threat detection and identification.

0
AWS Assume Role Helper Logo

A CLI utility that simplifies switching between different AWS roles by automatically managing AWS credentials file modifications.

0
Redirect.rules Logo

A dynamic redirect rules generator that creates custom redirect configurations for penetration testing and security assessment scenarios.

0
aws-lint-iam-policies Logo

A command-line tool that performs automated IAM policy security linting across AWS accounts and organizations using AWS Access Analyzer validation.

0
MockSSH Logo

MockSSH is a testing tool that emulates operating systems behind SSH servers to enable automation testing without requiring access to real servers.

0
Hakiri Toolbelt Logo

A command line tool that automates vulnerability scanning of Ruby gems and Rails stack components by identifying CVE vulnerabilities in detected technology versions.

0
GDPatrol Logo

A serverless SOAR framework for AWS GuardDuty that automatically executes configurable response actions based on security findings and threat severity.

0
WALKOFF Logo

WALKOFF is an automation framework that provides drag-and-drop workflow creation capabilities for integrating security tools and automating repetitive tasks.

0
DumpsterDiver Logo

DumpsterDiver analyzes large datasets to detect hardcoded secrets, keys, and passwords using entropy calculations and customizable search rules.

0
Zeus AWS Auditing & Hardening Tool Logo

Zeus is an AWS security auditing and hardening tool that evaluates cloud configurations against CIS benchmarks and can automatically apply recommended security settings.

0
Bane Logo

Bane is an automated AppArmor profile generator for Docker containers that simplifies the creation of security policies with file globbing support and Docker integration.

0