Loading...
Explore 11 curated cybersecurity tools, with 14,858 visitors searching for solutions
Managed EDR deployment, policy management, and maintenance service
Managed EDR deployment, policy management, and maintenance service
Splunk consulting services for deployment optimization and configuration
Splunk consulting services for deployment optimization and configuration
A CLI program that simplifies cybersecurity solution management through automated deployment, configuration, monitoring, and lifecycle operations across multiple hosts.
A CLI program that simplifies cybersecurity solution management through automated deployment, configuration, monitoring, and lifecycle operations across multiple hosts.
A reference guide providing Docker commands and concepts for containerized application development and deployment.
A reference guide providing Docker commands and concepts for containerized application development and deployment.
An automated script that configures Active Directory domains using customizable XML configuration files.
An automated script that configures Active Directory domains using customizable XML configuration files.
An Ansible role that automates the deployment and management of Bifrozt honeypots for network security monitoring.
An Ansible role that automates the deployment and management of Bifrozt honeypots for network security monitoring.
DFIR ORC Documentation provides detailed instructions for setting up the build environment and deploying the tool.
DFIR ORC Documentation provides detailed instructions for setting up the build environment and deploying the tool.
Automated script to install and deploy a honeypot with kippo, dionaea, and p0f on Ubuntu 12.04.
Automated script to install and deploy a honeypot with kippo, dionaea, and p0f on Ubuntu 12.04.
Bearded Avenger is a cybersecurity tool with various integrations and deployment instructions available.
Bearded Avenger is a cybersecurity tool with various integrations and deployment instructions available.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure