AbuseIO is an open-source abuse management toolkit that allows users to receive, process, correlate abuse reports, and send notifications with specific information regarding abuse cases on their network. It aims to automate and improve the abuse handling process by consolidating efforts from various companies and individuals. It is 100% free and open source, works with both IPv4 and IPv6 addresses, automatically parses events into abuse tickets, integrates with existing IPAM systems, allows for automatic notifications per case or customer with configurable intervals, enables abuse desks and end users to reply, close, or add notes to cases, links end users to a self-help portal, and supports a wide range of feeds including ShadowServer, SpamCop, Netcraft, Google Safe Browsing, IP Echelon, C-SIRT, Project Honey Pot, Abuse-IX, and more.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Migrated Splunk SOAR Connectors to new GitHub organization for better organization and management.
Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.
A security analytics platform that integrates with Google Chronicle to deliver Autonomic Security Operations through data engineering, detection engineering, and response engineering.
A centralized management console for efficiently operating and monitoring large-scale, multitenant Logpoint SIEM deployments across customers, geographies, and organizational divisions.
A framework for improving detection strategies and alert efficacy.
Incident response framework focused on remote live forensics
Sample security playbooks for security automation, orchestration and response (SOAR) using Microsoft Sentinel trigger
A data curation platform that automates security data collection, transformation and routing while reducing data volume and infrastructure costs.
PINNED
NordVPN
NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.