This repository contains the source-code for packaged IBM SOAR Apps. Many of these apps are available for download from IBM Security App Exchange. This source code repository may include unpublished versions and additional apps that are not published to App Exchange. In that scenario you will need to build and install them yourself. Developing new apps is straightforward using the IBM SOAR SDK. A good introduction can be found on the IBM SOAR App Developer Guide. On this web page, select your SOAR platform version. On the follow-on page, you can find the App Developer’s Guide by expanding Apps in the Table of Contents pane. For more advanced documentation on our APIs and available Python libraries, visit our Python Docs. For questions and discussion, head over to the IBM SOAR Community where you'll find blogs, technotes, discussion forums and other useful resources. Unless otherwise specified, contents of this repository are published under the MIT open-source license. Files and subdirectories within this repository may contain specific
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
PLC-side fuzzing tool for uncovering vulnerabilities in ICS control applications.
Community project for developing common guidelines and best practices for secure configurations.
Catch up on the latest cybersecurity news and updates from around the world.
Domain registration and web hosting services with free features and 24/7 customer support
Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.
Porting GNU/Linux userland tools to the bionic/Linux userland of Android to provide access to the audit stream for Android applications with minimal overhead.
A comprehensive platform for software developers to learn, create, and optimize applications for Arm-based processors
A security oriented, feedback-driven, evolutionary, easy-to-use fuzzer with interesting analysis options.
A comprehensive server cryptographic protocol analyzer with API and CLI interface.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.