Automation

Explore 203 curated cybersecurity tools, with 14,519+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

ComDroid Logo

A technology-focused blog discussing innovations in painting and the importance of expert painters.

0
InsightConnect Plugins Logo

An open source repository of plugins for Rapid7 InsightConnect that enables security orchestration and automation through integrations with various security tools and services.

0
Clevis Logo

Clevis is a pluggable framework that enables automated decryption of data and LUKS volumes through a pin-based plugin system.

0
PacBot Logo

PacBot is a cloud security platform that provides continuous compliance monitoring, automated policy enforcement, and security reporting through policy-as-code implementation and multi-source data integration.

0
AWS Security Architectures Logo

A comprehensive AWS security automation toolkit that provides event monitoring, data protection, resource management, and security configuration validation across AWS environments.

0
IAM Zero Logo

IAM Zero detects identity and access management issues and automatically suggests least-privilege policies by analyzing application errors and access patterns in cloud environments.

0
Fail2ban Logo

Fail2ban is a daemon that automatically bans IP addresses showing malicious behavior by monitoring log files and updating firewall rules to prevent brute-force attacks.

0
Hunter Logo

An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.

0
Axiom Logo

A dynamic multi-cloud infrastructure framework that enables rapid deployment of disposable instances pre-loaded with security tools for distributed offensive and defensive security operations.

0
Dufflebag Logo

Dufflebag searches through public AWS EBS snapshots to identify accidentally exposed secrets and sensitive information.

0
Shuffle Workflows Logo

A collection of automation workflows for the Shuffle security orchestration platform that covers common cybersecurity use-cases and can be customized for organizational needs.

0
Repokid Logo

Repokid automatically removes unused service permissions from AWS IAM role inline policies using Access Advisor data to implement least privilege access.

0
Dockerfiles for Testing Logo

Container image definitions that create standardized testing environments for software applications with consistent dependencies and configurations.

0
Dependency Combobulator Logo

An open-source framework that detects and prevents dependency confusion attacks across multiple package management systems and development environments.

0
Stackstorm Logo

StackStorm is an open-source automation platform that connects and automates DevOps workflows and integrates with existing infrastructure.

0
VxSig Logo

VxSig is a Google-developed tool that automatically generates antivirus byte signatures from similar binaries for Yara and ClamAV detection engines.

0
stoQ Logo

A super-simple, modern framework for organizing and automating cybersecurity tasks.

0
Palo Alto Networks Cortex XSOAR Logo

SOAR platform for orchestrating security products and automating SOC tasks

0
AutoYara Logo

AutoYara is a Java tool that automatically generates YARA rules from malware samples using biclustering algorithms to help analysts create detection rules for malware families.

0
cfn-nag Logo

cfn-nag is a static analysis tool that scans AWS CloudFormation templates to identify security vulnerabilities and misconfigurations in infrastructure-as-code.

0
Scumblr Logo

Scumblr is a web-based security automation platform that performs periodic data source synchronization and security analysis to help organizations proactively identify and track security issues.

0
PyIntelOwl Logo

PyIntelOwl is a Python SDK and CLI client for interacting with IntelOwl's threat intelligence API to submit files and observables for automated security analysis.

0
Splunk Attack Range Logo

An open-source platform that builds instrumented environments, simulates attacks, and integrates with Splunk for detection rule development and testing.

0
AWS Security Automation Logo

A collection of AWS-native scripts and automation tools for DevSecOps, incident response, and security remediation in cloud environments.

0