Security Operations

Explore 148 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Substation Logo

A cloud-native, event-driven data pipeline toolkit for security teams that processes and routes data across AWS services with custom formatting and API enrichment capabilities.

0
Unfetter Logo

Unfetter is a reference implementation framework that collects events from client machines and performs CAR analytics using an ELK stack with Apache Spark to detect potential adversary activity.

0
FIR (Fast Incident Response) Logo

FIR is a Python-based cybersecurity incident management platform designed for CSIRTs, CERTs, and SOCs to create, track, and report security incidents.

0
Shuffle Automation Logo

Shuffle Automation is an accessible automation platform that provides workflow automation capabilities for security operations with both self-hosted and cloud deployment options.

0
IRIS-SOAR Logo

IRIS-SOAR is a Python-based modular SOAR platform that automates security incident response workflows and integrates with DFIR-IRIS for enhanced digital forensics operations.

0
Matano Open Source Security Data Lake Logo

An open source cloud-native security data lake platform for AWS that normalizes security logs into structured data with Detection-as-Code capabilities and vendor-neutral storage using open standards.

0
HpfeedsHoneyGraph Logo

HpfeedsHoneyGraph is a visualization application that creates graphical representations of hpfeeds logs to aid cybersecurity analysis of honeypot data.

0
GOSINT Logo

Open Source Threat Intelligence Gathering and Processing Framework

0
Weave Scope Logo

Weave Scope is a real-time visualization and monitoring tool that automatically maps Docker container infrastructures and microservices, providing interactive topology views and direct container management capabilities.

0
Workflow Templates Repository Logo

A community repository of workflow templates for the Ayehu NG platform that enables automated IT and business process execution.

0
AWS Incident Response Kit (AIRK) Logo

A Python-based modular incident response tool for AWS environments that enables automated security actions across EC2, IAM, VPC, and other AWS resources.

0
RedELK Logo

RedELK is a SIEM tool designed for red teams to monitor and receive alerts about blue team detection activities during penetration testing engagements.

0
Custom Activities Repository Logo

A community-driven repository and development framework for creating custom automation activities within the Ayehu NG IT orchestration platform.

0
Cloudlist Logo

A multi-cloud asset enumeration tool that helps blue teams centralize and inventory assets across multiple cloud providers with minimal configuration.

0
Shuffle Apps Logo

A repository of public applications for the Shuffle security orchestration platform that enables automated security workflows and integrations.

0
Microsoft Sentinel Security Playbooks Logo

A repository of sample security playbooks with ARM templates for Microsoft Sentinel that enable automated security orchestration and response capabilities.

0
PlumHound Logo

PlumHound is a reporting engine that converts BloodHoundAD's Neo4J queries into operational security reports for analyzing Active Directory vulnerabilities and attack paths.

0
NotifySecurity Logo

An Outlook add-in that enables one-click reporting of suspicious emails to security teams with integrated statistics tracking and SMTP header collection.

0
event-generator Logo

A testing tool that generates suspect actions to validate and test Falco runtime security monitoring rulesets.

0
Catalyst Logo

Catalyst is a SOAR platform that automates alert handling and incident response procedures through ticket management, templates, and playbooks.

0
Panther Detections Logo

A collection of detections for Panther SIEM with detailed setup instructions.

0
JIMI SOAR Logo

JIMI is a flow-based orchestration automation platform that combines low-code and no-code capabilities for multi-team collaboration across IT, security, and development operations.

0
COPS - Collaborative Open Playbook Standard Logo

COPS is a YAML-based schema standard for creating collaborative DFIR playbooks that provide structured guidance for incident response processes.

0
GDPatrol Logo

A serverless SOAR framework for AWS GuardDuty that automatically executes configurable response actions based on security findings and threat severity.

0