Megatron is a tool implemented by CERT-SE for abuse- and incident handling, capable of collecting and analyzing log files with bad machines from sources like Shadowserver. It offers features such as flexible parsing, organization matching, database storage, filtering, data decoration, and various types of lookups.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Open-source security automation platform for automating security alerts and building AI-assisted workflows.
Cortex XSOAR is a comprehensive SOAR platform that automates and standardizes security processes for faster response times and increased team productivity.
Shuffle is a platform for automating security workflows with confidence, offering templates, collaboration tools, and a large app library.
Fast Intercept is a security automation platform that empowers users to maximize their existing security products and automate routine tasks.
jimi is an orchestration automation tool for multi-team collaboration and automation in IT/Security operations, Development, and CI/CD pipelines.
An open-source, drag-and-drop security workflow builder with integrated case management for automating security workflows and tackling alert fatigue.
Automatically configure your app to follow OWASP security patterns and principles with Nuxt Security module.
A custom activity repository for Ayehu NG automation platform, allowing users to create and modify activities to fit their specific needs.
Catalyst is a SOAR system that automates alert handling and incident response processes, adapting to your workflows and being open source.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.