Security Operations
Browse 379 cybersecurity tools tagged with "Security Operations"
Damn Vulnerable iOS
Penetration Testing
Damn Vulnerable iOS App (DVIA) on SecurityListing: iOS application for testing iOS penetration testing skills in a legal environment.
ProLion CryptoSpike
Extended Detection and Response
ProLion CryptoSpike on SecurityListing: Real-time ransomware detection & blocking for storage systems with recovery
Monkey-Spider
Security Operations
Monkey-Spider on SecurityListing: A crawler-based low-interaction client honeypot for exposing website threats.
Logsign Unified SO
Threat Hunting
Logsign Unified SO Platform on SecurityListing: SOAR platform automating threat detection, incident response, and workflows
Reverse Engineering Challenges
Cyber Range Training
Reverse Engineering Challenges on SecurityListing: A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
CBRX
Digital Forensics and Incident Response
CBRX on SecurityListing: CBRX is a cloud-based platform that automates incident analysis and reporting for cybersecurity teams.
Nomoreransom
Digital Forensics and Incident Response
Nomoreransom on SecurityListing: No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.
ESET Protect MDR
Threat Hunting
ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.
Metadefender Cloud
Digital Forensics and Incident Response
Metadefender Cloud on SecurityListing: Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.
Intrusion Detection Honeypots
Network Security
Intrusion Detection Honeypots on SecurityListing: A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.
Cipher xMDR
Threat Hunting
Cipher xMDR on SecurityListing: AI-driven MDR service providing unified threat detection across IT, OT, cloud
LogCraft Detection Engineering
Endpoint Detection and Response
LogCraft Detection Engineering on SecurityListing: Detection-as-code platform for managing detection rules across SIEM/EDR/XDR
Kali
Vulnerability Assessment
Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
Mandiant Threat Defense
Threat Hunting
Mandiant Threat Defense on SecurityListing: Managed threat detection, hunting, and response service by Mandiant experts
D3 Morpheus AI
Threat Intelligence Platforms
D3 Morpheus AI SOC on SecurityListing: AI-driven SOC platform for automated alert triage, investigation, and response
DuskRise Security Dashboard
Security Information and Event Management
DuskRise Security Dashboard on SecurityListing: Security dashboard for remote network visibility and policy enforcement
Brute Ratel C4
Offensive Security
Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
AccessData FTK Imager
Digital Forensics and Incident Response
AccessData FTK Imager on SecurityListing: A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.
Anvilogic
Security Information and Event Management
Anvilogic on SecurityListing: Anvilogic is a SIEM platform that streamlines detection engineering, offers cost-effective data management, and enhances threat detection capabilities.
Art of Memory
Digital Forensics and Incident Response
Art of Memory Forensics on SecurityListing: A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.
LAMPSecurity Training
Penetration Testing
LAMPSecurity Training on SecurityListing: A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.
PEview
Digital Forensics and Incident Response
PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.
Honeyd Tools
Security Operations
Honeyd Tools on SecurityListing: A collection of tools that can be used with Honeyd for data analysis or other purposes
xargs
Offensive Security
xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
Attack-Defense Online Lab
Vulnerability Assessment
Attack-Defense Online Lab on SecurityListing: Hands-on cybersecurity training and testing platform with 1800+ labs
PentesterLab PRO
Penetration Testing
PentesterLab PRO on SecurityListing: Online platform offering 700+ hands-on web security exercises and training
Lumifi ShieldVision™
Endpoint Detection and Response
Lumifi ShieldVision™ on SecurityListing: SOAR platform with investigation, automation, and incident mgmt capabilities
Cobalt Strike HTTP
Offensive Security
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.
DorkSearch
Offensive Security
DorkSearch on SecurityListing: An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
Dropzone AI
Security Orchestration Automation and Response
Dropzone AI on SecurityListing: Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.
exif
Digital Forensics and Incident Response
exif on SecurityListing: A command-line utility to show and change EXIF information in JPEG files
Blockbit XDR
Threat Intelligence Platforms
Blockbit XDR on SecurityListing: XDR platform providing detection and response across endpoints, networks, and email
ORDR IQ
Security Orchestration Automation and Response
ORDR IQ on SecurityListing: Multi-agent AI orchestrator for IT and security workflow automation
ParrotSec
Offensive Security
ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
Logpoint SecOps Platform
Security Information and Event Management
Logpoint SecOps Platform on SecurityListing: Integrated SIEM, SOAR, NDR platform with central fleet management capabilities
Zenduty
Security Orchestration Automation and Response
Zenduty on SecurityListing: Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.
Capsicum
Container Security
Capsicum on SecurityListing: A security framework for process isolation and sandboxing based on capability-based security principles.
PoshC2
Penetration Testing
PoshC2 on SecurityListing: A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.
Logz.io Distributed Tracing
Security Information and Event Management
Logz.io Distributed Tracing on SecurityListing: Distributed tracing platform for monitoring microservices performance
Lab of a
Offensive Security
Lab of a Penetration Tester: Week of Evading Microsoft ATA on SecurityListing: A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
Combatting Incident Responders
Offensive Security
Combatting Incident Responders with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.
Event Log Explorer
Security Information and Event Management
Event Log Explorer on SecurityListing: Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.
BeEF
Penetration Testing
BeEF on SecurityListing: BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.
Threat.Zone
Digital Forensics and Incident Response
Threat.Zone on SecurityListing: Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.
HoneyDB
Threat Hunting
HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.
Belkasoft X Forensic
Digital Forensics and Incident Response
Belkasoft X Forensic on SecurityListing: A reliable end-to-end DFIR solution for boosting cyber incident response and forensics capacity.
Binalyze AIR
Digital Forensics and Incident Response
Binalyze AIR on SecurityListing: Modern digital forensics and incident response platform with comprehensive tools.
Itential Orchestration
API Security
Itential Orchestration on SecurityListing: AI-powered orchestration platform for network & infrastructure automation
Valkyrie Comodo
Digital Forensics and Incident Response
Valkyrie Comodo on SecurityListing: Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
Covert Red Team
Offensive Security
Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.
Crowdstrike Charlotte AI
Extended Detection and Response
Crowdstrike Charlotte AI on SecurityListing: GenAI assistant that provides faster intelligence for security operations
CrowdStrike Falcon Onum
Security Information and Event Management
CrowdStrike Falcon Onum on SecurityListing: Data pipeline mgmt for SOC transformation with real-time data processing
Zeronsec Anrita
Threat Hunting
Zeronsec Anrita on SecurityListing: Real-time threat detection and monitoring platform with SIEM capabilities
Explorer Suite
Digital Forensics and Incident Response
Explorer Suite on SecurityListing: A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.
Shuffler
Security Orchestration Automation and Response
Shuffler on SecurityListing: Shuffle Automation provides an open-source platform for security orchestration, automation, and response.
Hybrid-Analysis
Threat Intelligence Platforms
Hybrid-Analysis on SecurityListing: Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
H3C U-Center Unified
Security Information and Event Management
H3C U-Center Unified O&M Cloud on SecurityListing: Unified O&M cloud platform for network and IT infrastructure management
Cydarm Platform
Security Orchestration Automation and Response
Cydarm Platform on SecurityListing: SOC management platform for incident response and cyber response management
Impost
Network Security
Impost on SecurityListing: Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.
DiskShadow
Offensive Security
DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
TechTarget
Offensive Security
TechTarget on SecurityListing: Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.
Grep App
Threat Hunting
Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
Graylog
Security Information and Event Management
Graylog on SecurityListing: Graylog offers advanced log management and SIEM capabilities to enhance security and compliance across various industries.
LogRythm SIEM
Security Information and Event Management
LogRythm SIEM on SecurityListing: LogRhythm SIEM is a comprehensive security information and event management platform that collects, analyzes, and responds to security events across an organization's IT infrastructure.
Logsign Unified Security
Threat Intelligence Platforms
Logsign Unified Security Operations Platform on SecurityListing: Unified security operations platform combining SIEM, TI, UEBA, and TDIR
Verisys File Integirty
Security Information and Event Management
Verisys File Integirty Monitoring on SecurityListing: A next-generation file integrity monitoring and change detection system
With Secure Elements
Exposure Management
With Secure Elements Platform on SecurityListing: WithSecure Elements Cloud is a modular cybersecurity platform that combines AI-powered software and expert services to provide comprehensive protection across endpoints, identities, and cloud environments.
Fidelis Security
Endpoint Detection and Response
Fidelis Security on SecurityListing: XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities
Heimdal Unified Cybersecurity
Endpoint Detection and Response
Heimdal Unified Cybersecurity Platform on SecurityListing: Unified cybersecurity platform with XDR, EDR, PAM, email security, and compliance
Highlighter
Threat Hunting
Highlighter on SecurityListing: Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.
LaBrea
Penetration Testing
LaBrea on SecurityListing: LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.
Magnet ACQUIRE
Digital Forensics and Incident Response
Magnet ACQUIRE on SecurityListing: Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.
Harness AI for
Security Orchestration Automation and Response
Harness AI for DevOps on SecurityListing: AI-powered DevOps platform for CI/CD, testing, security, and cost mgmt.
OODA-driven SOC Strategy
Endpoint Detection and Response
OODA-driven SOC Strategy on SecurityListing: Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
HoneyView
Security Operations
HoneyView on SecurityListing: HoneyView is a tool for analyzing honeyd logfiles graphically and textually.
NetWitness Cybersecurity
Endpoint Detection and Response
NetWitness Cybersecurity on SecurityListing: Integrated XDR platform combining NDR, SIEM, EDR, and SOAR capabilities
Hunters Pathfinder AI
Threat Hunting
Hunters Pathfinder AI on SecurityListing: AI-driven SOC platform with autonomous threat detection, investigation & response
IO Wargame
Cyber Range Training
IO Wargame on SecurityListing: Frontpage of the IO wargame with various versions and connection details.
Perisai Agentic-AI Hyperautomation
Endpoint Detection and Response
Perisai Agentic-AI Hyperautomation on SecurityListing: AI-driven SOAR platform for automated incident response & threat detection
IonX Verisys FIM
Security Information and Event Management
IonX Verisys FIM on SecurityListing: File integrity monitoring for Windows, Linux & network devices
Prophet Security Prophet
Security Orchestration Automation and Response
Prophet Security Prophet AI SOC Analyst on SecurityListing: AI-powered SOC analyst that automates alert triage and investigation
Prophet Security Prophet
Threat Hunting
Prophet Security Prophet AI Threat Hunter on SecurityListing: AI-driven threat hunting platform for SOC alert triage and investigation
0xf.at Hackits
Cyber Range Training
0xf.at Hackits on SecurityListing: Solve password-riddles on a website without logins or ads.
Daylight Threat Detection
Threat Hunting
Daylight Threat Detection and Response on SecurityListing: AI-powered MDR combining agentic AI with human expertise for threat detection
Hunters Next-Gen SIEM
Threat Hunting
Hunters Next-Gen SIEM on SecurityListing: Next-gen SIEM with AI-powered triage, automated investigation & detection
State of Security
Offensive Security
State of Security on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Reversing and Exploiting
Offensive Security
Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
Purple Academy by
Cyber Range Training
Purple Academy by Picus on SecurityListing: Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.
CrowdStrike Community Tools
Digital Forensics and Incident Response
CrowdStrike Community Tools on SecurityListing: Free tools for the CrowdStrike customer community to support their use of the Falcon platform.
detections.ai Detections
Threat Intelligence Platforms
detections.ai Detections on SecurityListing: Community platform for sharing and creating detection rules with AI
Logpoint Director
Security Information and Event Management
Logpoint Director on SecurityListing: A centralized management console for efficiently operating and monitoring large-scale, multitenant Logpoint SIEM deployments across customers, geographies, and organizational divisions.
Positive Hack Days
Cyber Range Training
Positive Hack Days Fest on SecurityListing: International cybersecurity festival for all, who wants to dive into the world of cyber security and have a great time.
Quorum Cyber Clarity
Data Loss Prevention
Quorum Cyber Clarity on SecurityListing: Managed security services platform offering MDR, threat detection, and DLP
Contagio Mobile
Digital Forensics and Incident Response
Contagio Mobile on SecurityListing: A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.
Attic MDR
Threat Hunting
Attic MDR on SecurityListing: 24/7 managed detection and response service for Microsoft 365 environments
CyberCPR
Digital Forensics and Incident Response
CyberCPR on SecurityListing: Incident response and case management solution for efficient incident response and management.
Fabric Platform by
Security Information and Event Management
Fabric Platform by BlackStork on SecurityListing: Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Daniel Miessler/Unsupervised Learning
Offensive Security
Daniel Miessler/Unsupervised Learning on SecurityListing: Sysreptor offers a customizable reporting solution for offensive security assessments.
hackxor
Cyber Range Training
hackxor on SecurityListing: A platform offering hacking missions to test and enhance skills.
MFTECmd
Digital Forensics and Incident Response
MFTECmd on SecurityListing: A command-line tool for managing and analyzing Microsoft Forefront TMG and UAG configurations.
KFSensor
Penetration Testing
KFSensor on SecurityListing: KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.
DEF CON CTF
Container Security
DEF CON CTF Archive on SecurityListing: A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
DNS Tunnelling
Offensive Security
DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.
Executing Commands and
Offensive Security
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts on SecurityListing: A blog post about bypassing AppLocker using PowerShell diagnostic scripts
ExoneraTor
Digital Forensics and Incident Response
ExoneraTor on SecurityListing: Check if an IP address was used as a Tor relay on a given date.
ExploitDB
Penetration Testing
ExploitDB on SecurityListing: A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
GHH - Google
Security Operations
GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
Grafana Cloud Logs
Security Information and Event Management
Grafana Cloud Logs on SecurityListing: Managed log aggregation system for storing and querying application logs
Cobalt Strike's ExternalC2
Penetration Testing
Cobalt Strike's ExternalC2 framework on SecurityListing: A specification/framework for extending default C2 communication channels in Cobalt Strike
Threatpost
Offensive Security
Threatpost on SecurityListing: Sysreptor offers a customizable reporting solution for penetration testing and red teaming.
Userland API Monitoring
Digital Forensics and Incident Response
Userland API Monitoring and Code Injection Detection on SecurityListing: Explores malware interaction with Windows API and methods for detection and prevention.
Bait and Switch
Security Operations
Bait and Switch Honeypot on SecurityListing: An active and aggressive honeypot tool for network security.
PhotoRec
Digital Forensics and Incident Response
PhotoRec on SecurityListing: A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.
DVWA - Brute
Offensive Security
DVWA - Brute Force (High Level) - Anti-CSRF Tokens on SecurityListing: A guide to brute forcing DVWA on the high security level with anti-CSRF tokens
PAGO Networks PAGO
Endpoint Detection and Response
PAGO Networks PAGO MDR on SecurityListing: MDR service with real-time monitoring and threat response capabilities
RAD Security RAD
Security Orchestration Automation and Response
RAD Security RAD FusionAI Core on SecurityListing: AI-powered security platform that correlates signals & automates actions
Dynatrace
Security Information and Event Management
Dynatrace on SecurityListing: Unified observability and security platform with AI-powered analytics
Enterprise Detection &
Threat Hunting
Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response
Intelligence-Driven Incident Response
Digital Forensics and Incident Response
Intelligence-Driven Incident Response on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.
FEX Imager™
Digital Forensics and Incident Response
FEX Imager™ on SecurityListing: Forensic imaging program with full hash authentication and various acquisition options.
Fraud.com fcase Fraud
API Security
Fraud.com fcase Fraud Orchestration on SecurityListing: Fraud orchestration platform for financial institutions
HoneyDrive
Security Operations
HoneyDrive on SecurityListing: HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.
GNU Netcat
Offensive Security
GNU Netcat on SecurityListing: A featured networking utility for reading and writing data across network connections with advanced capabilities.
Quorum Cyber Emergency
Threat Hunting
Quorum Cyber Emergency MDR on SecurityListing: Emergency MDR service for orgs experiencing active cyber incidents or attacks
Gravwell Security Data
Threat Hunting
Gravwell Security Data Platform on SecurityListing: Security data platform for log analysis, metrics, and threat hunting
Graylog AI-Powered Security
API Security
Graylog AI-Powered Security & IT Operations on SecurityListing: AI-powered SIEM, API security, and log management platform
Lumifi Managed Detection
Endpoint Detection and Response
Lumifi Managed Detection & Response on SecurityListing: 24/7 MDR service with automated threat hunting and response capabilities
Lumifi Network Detection
Managed Detection and Response
Lumifi Network Detection & Response (NDR) on SecurityListing: Managed NDR service monitoring network traffic for threats via co-managed model
Proxmark III
Offensive Security
Proxmark III on SecurityListing: A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
How to Write
Offensive Security
How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset
Huntbase Platform
Threat Hunting
Huntbase Platform on SecurityListing: Platform for threat investigation with automation and knowledge management
Abusing DCOM For
Offensive Security
Abusing DCOM For Yet Another Lateral Movement Technique on SecurityListing: An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.
Abusing the COM
Offensive Security
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 on SecurityListing: Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
Jupyter Notebooks for
Threat Hunting
Jupyter Notebooks for Threat Hunting on SecurityListing: Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
HIHAT - High
Threat Intelligence Platforms
HIHAT - High Interaction Honeypot Analysis Toolkit on SecurityListing: A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.
LastActivityView
Digital Forensics and Incident Response
LastActivityView on SecurityListing: A tool that collects and displays user activity and system events on a Windows system.
Logpoint SOAR &
Security Orchestration Automation and Response
Logpoint SOAR & Automation on SecurityListing: SOAR platform for automated alert triage, investigation, and response
Aircrack-ng
Offensive Security
Aircrack-ng on SecurityListing: A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.
Logsign USO Platform
Security Information and Event Management
Logsign USO Platform on SecurityListing: SIEM platform with compliance reporting for regulatory standards
Belkasoft Evidence Center
Digital Forensics and Incident Response
Belkasoft Evidence Center on SecurityListing: Comprehensive digital forensics and incident response platform for law enforcement, corporate, and academic institutions.
NSFOCUS Intelligent Security
Threat Hunting
NSFOCUS Intelligent Security Operations Platform on SecurityListing: XDR platform with SOAR capabilities for security operations centers
Logz.io Log Management
Security Information and Event Management
Logz.io Log Management on SecurityListing: Cloud-based log management platform with AI-driven analysis and observability
BitLyft AIR®
Security Orchestration Automation and Response
BitLyft AIR® on SecurityListing: Automated incident response platform for Microsoft 365 and identity systems
Bifrozt
Security Operations
Bifrozt on SecurityListing: High interaction honeypot solution for Linux systems with data control and integrity features.
Panaseer Metrics Measurement
Risk Assessment
Panaseer Metrics Measurement on SecurityListing: Automates security metrics measurement and reporting for posture management.
Mandiant Managed Defense
Threat Hunting
Mandiant Managed Defense on SecurityListing: 24/7 managed threat detection, investigation, and response service
Devo Security Data
Threat Hunting
Devo Security Data Platform on SecurityListing: Security data platform combining SIEM, SOAR, UEBA, and threat hunting
Practical Memory Forensics
Digital Forensics and Incident Response
Practical Memory Forensics on SecurityListing: A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
Ophcrack
Offensive Security
Ophcrack on SecurityListing: Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
BitLyft True MDR
Threat Hunting
BitLyft True MDR on SecurityListing: 24/7 managed detection and response service with US-based SOC analysts
cabextract
Digital Forensics and Incident Response
cabextract on SecurityListing: Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
Agentic AI AR2™
Threat Intelligence Platforms
Agentic AI AR2™ on SecurityListing: Autonomous AI SOC platform for automated threat response and remediation
Alien Vault Ossim
Vulnerability Assessment
Alien Vault Ossim on SecurityListing: AlienVault OSSIM provides an all-in-one security management solution with asset discovery, vulnerability assessment, and SIEM capabilities.
GNU Binutils
Digital Forensics and Incident Response
GNU Binutils on SecurityListing: A collection of binary tools for various purposes including linking, assembling, profiling, and more.
Coralogix DataPrime Engine
Security Information and Event Management
Coralogix DataPrime Engine on SecurityListing: Observability platform with unified query engine for logs, metrics, and traces
Coro Cybersecurity
Security Awareness Training
Coro Cybersecurity on SecurityListing: Unified cybersecurity platform with modular security controls and AI engine
DFIR CTF: Precision
Cyber Range Training
DFIR CTF: Precision Widgets of North Dakota Intrusion on SecurityListing: A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.
Detecting Lateral Movement
Digital Forensics and Incident Response
Detecting Lateral Movement through Tracking Event Logs (Version 2) on SecurityListing: A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.
StrangeBee Cortex
Security Orchestration Automation and Response
StrangeBee Cortex on SecurityListing: Open-source observable analysis engine and companion tool for TheHive platform
Logz.io Observability Platform
Security Information and Event Management
Logz.io Observability Platform on SecurityListing: Observability platform with log mgmt, metrics, tracing & AI-powered RCA
BluSapphire SIEMless™ SIEM
Security Information and Event Management
BluSapphire SIEMless™ SIEM on SecurityListing: Distributed SIEM with edge processing, AI filtering, and autonomous response
Axoflow Platform
Security Information and Event Management
Axoflow Platform on SecurityListing: Security data pipeline platform for collecting, curating, and routing logs
Caldera
Offensive Security
Caldera on SecurityListing: Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.
Operating System Based
Offensive Security
Operating System Based Redirection with Apache mod_rewrite on SecurityListing: Detect users' operating systems and perform redirection with Apache mod_rewrite.
dfir.org
Digital Forensics and Incident Response
dfir.org on SecurityListing: Andrew Case's personal page for research, software projects, and speaking events
Forensic Registry EDitor
Digital Forensics and Incident Response
Forensic Registry EDitor (FRED) on SecurityListing: A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.
CyberSight Demo
Security Information and Event Management
CyberSight Demo on SecurityListing: Client-facing dashboard for cybersecurity posture visibility and monitoring
Graylog Graylog
API Security
Graylog Graylog on SecurityListing: AI-powered SIEM, API security, and log management platform
Detecting the Elusive
Threat Hunting
Detecting the Elusive - Active Directory Threat Hunting on SecurityListing: A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
Empire Communication Profiles
Offensive Security
Empire Communication Profiles on SecurityListing: Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.
Prophet Security Prophet
Security Orchestration Automation and Response
Prophet Security Prophet AI on SecurityListing: AI-driven SOC platform for automated alert triage, investigation & response
D3 Security Smart
Threat Intelligence Platforms
D3 Security Smart SOAR on SecurityListing: SOAR platform for security orchestration, automation, and incident response
bohops Leveraging INF-SCT
Offensive Security
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
Java Decompiler Online
Offensive Security
Java Decompiler Online on SecurityListing: Online Java decompiler tool with support for modern Java features.
CyberMaxx MaxxMDR
Endpoint Detection and Response
CyberMaxx MaxxMDR on SecurityListing: MDR solution combining threat detection, response, and offensive security
Netdude
Digital Forensics and Incident Response
Netdude on SecurityListing: Network Dump data Displayer and Editor framework for tcpdump trace files manipulation.
Golismero
Threat Hunting
Golismero on SecurityListing: A free and open-source OSINT framework for gathering and analyzing data from various sources
Coro Platform
Data Loss Prevention
Coro Platform on SecurityListing: Unified cybersecurity platform with multiple security modules and single agent
JS NICE
Digital Forensics and Incident Response
JS NICE on SecurityListing: Statistical renaming, Type inference, and Deobfuscation tool for JavaScript code.
Log Parser Lizard
Security Information and Event Management
Log Parser Lizard on SecurityListing: A dynamic GUI for advanced log analysis, allowing users to execute SQL queries on structured log data.
Metasploit Unleashed
Penetration Testing
Metasploit Unleashed on SecurityListing: Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.
Echotrail Insights
Digital Forensics and Incident Response
Echotrail Insights on SecurityListing: Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
Gravwell
Security Information and Event Management
Gravwell on SecurityListing: Data analytics platform for security operations with search and automation
Devo Platform
Threat Intelligence Platforms
Devo Platform on SecurityListing: Integrated SIEM, SOAR, and UEBA platform with AI-driven threat detection
PTJunior
Offensive Security
PTJunior on SecurityListing: AI agent that autonomously discovers, exploits, and documents vulnerabilities.
Binary Ninja
Digital Forensics and Incident Response
Binary Ninja on SecurityListing: Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.
Logsign SAP Security
Security Information and Event Management
Logsign SAP Security on SecurityListing: SIEM platform for SAP security monitoring and threat detection
DNIF HYPERCLOUD
Threat Hunting
DNIF HYPERCLOUD on SecurityListing: SIEM platform with user analytics and automation for threat detection
D3 Smart SOAR
Threat Hunting
D3 Smart SOAR on SecurityListing: SOAR platform with automated threat hunting and investigation capabilities
Viper
Digital Forensics and Incident Response
Viper on SecurityListing: A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
LockBoxx
Offensive Security
LockBoxx on SecurityListing: Introduction to using GScript for Red Teams
CyberForce
Threat Intelligence Platforms
CyberForce|Q COSOC on SecurityListing: 24x7x365 Security Operations Center with threat detection and response services
Mature SIEM Environment
Security Orchestration Automation and Response
Mature SIEM Environment for SOAR Implementation on SecurityListing: A mature SIEM environment is critical for successful SOAR implementation.
Abusing Exported Functions
Offensive Security
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement on SecurityListing: A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement
Logz.io Infrastructure Monitoring
Security Information and Event Management
Logz.io Infrastructure Monitoring on SecurityListing: Prometheus-based infrastructure monitoring with unified logs, metrics, and traces
Netenrich Adaptive MDR
Threat Intelligence Platforms
Netenrich Adaptive MDR on SecurityListing: AI-powered MDR service with Google SecOps integration for threat detection
GroupSense Ransomware Readiness
Digital Risk Protection
GroupSense Ransomware Readiness on SecurityListing: Ransomware preparedness & response service with playbooks and negotiation
strings
Digital Forensics and Incident Response
strings on SecurityListing: A command-line utility for extracting human-readable text from binary files.
Hunters SOC Platform
Threat Hunting
Hunters SOC Platform on SecurityListing: Next-gen SIEM with AI-powered alert investigation and automated response
Fraud.com aiReflex
Risk Assessment
Fraud.com aiReflex on SecurityListing: AI-powered fraud detection platform for transaction monitoring and prevention
dc3dd
Digital Forensics and Incident Response
dc3dd on SecurityListing: dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.
FastIntercept
Security Orchestration Automation and Response
FastIntercept on SecurityListing: Fast Intercept is a security automation platform that empowers users to maximize their existing security products and automate routine tasks.
checkra1n
Offensive Security
checkra1n on SecurityListing: Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Loading Alternate Data
Offensive Security
Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker on SecurityListing: Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.
Charles Web Debugging
Digital Forensics and Incident Response
Charles Web Debugging Proxy on SecurityListing: An HTTP proxy, monitor, and reverse proxy tool for viewing HTTP and SSL/HTTPS traffic.
Intezer
Threat Hunting
Intezer on SecurityListing: Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
Huawei SecoManager Security
Security Orchestration Automation and Response
Huawei SecoManager Security Controller on SecurityListing: Security controller for policy mgmt, orchestration & log management
Ekasha Incident Management
Security Orchestration Automation and Response
Ekasha Incident Management on SecurityListing: Incident management platform with automation, workflows, and playbooks
THOR Lite
Digital Forensics and Incident Response
THOR Lite on SecurityListing: A free, fast, and flexible multi-platform IOC and YARA scanner for Windows, Linux, and macOS.
Gradient Cyber Quorum™
Threat Intelligence Platforms
Gradient Cyber Quorum™ on SecurityListing: Unified threat detection platform for network, endpoint, cloud, and user telemetry
ARM Assembly and
Offensive Security
ARM Assembly and Shellcode on SecurityListing: A comprehensive collection of resources for learning ARM assembly language and shellcode development.
Huntress Managed Security
Endpoint Detection and Response
Huntress Managed Security Platform on SecurityListing: Managed security platform with EDR, ITDR, SIEM, and SAT backed by 24/7 SOC
LeakIX
Offensive Security
LeakIX on SecurityListing: LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.
edb
Digital Forensics and Incident Response
edb on SecurityListing: edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.
Lumifi Endpoint Detection
Endpoint Detection and Response
Lumifi Endpoint Detection & Response (EDR/XDR) on SecurityListing: Managed EDR/XDR service with 24/7 SOC monitoring and threat response
netsniff-ng toolkit
Digital Forensics and Incident Response
netsniff-ng toolkit on SecurityListing: netsniff-ng is a free Linux networking toolkit with zero-copy mechanisms for network development, analysis, and auditing.
Catalyst SOAR
Security Orchestration Automation and Response
Catalyst SOAR on SecurityListing: Catalyst is a SOAR system that automates alert handling and incident response processes, adapting to your workflows and being open source.
Amazon Detective
Digital Forensics and Incident Response
Amazon Detective on SecurityListing: A service that analyzes and visualizes security data to investigate potential security issues.
Foremost
Digital Forensics and Incident Response
Foremost on SecurityListing: A console program for file recovery through data carving.
Granef
Digital Forensics and Incident Response
Granef on SecurityListing: A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.
NETRESEC
Digital Forensics and Incident Response
NETRESEC on SecurityListing: Independent software vendor specializing in network security tools and network forensics.
DBAppSecurity AiLog Big
Threat Intelligence Platforms
DBAppSecurity AiLog Big Data Log Management and Analysis Platform on SecurityListing: Big data log management platform for collection, parsing, storage & analysis
Google Search Operators:
Threat Hunting
Google Search Operators: The Complete List (44 Advanced Operators) on SecurityListing: A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.
Bastille-Linux
Offensive Security
Bastille-Linux on SecurityListing: Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.
Proxmark 3
Offensive Security
Proxmark 3 on SecurityListing: The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.
Workbench
Digital Forensics and Incident Response
Workbench on SecurityListing: A scalable python framework for security research and development teams.
LogRhythm Axon
Security Information and Event Management
LogRhythm Axon on SecurityListing: A cloud-native SIEM platform that provides security analytics, intuitive workflow, and simplified incident response to help security teams defend against cyber threats.
extundelete
Digital Forensics and Incident Response
extundelete on SecurityListing: A utility for recovering deleted files from ext3 or ext4 partitions.
Quorum Cyber Clarity
Threat Hunting
Quorum Cyber Clarity Extend on SecurityListing: Managed detection and response service with 24/7 SOC monitoring
ERM Protect Digital
Digital Forensics and Incident Response
ERM Protect Digital Forensics on SecurityListing: Digital forensics services provided by ERM Protect
Honeybrid
Network Security
Honeybrid on SecurityListing: A hybrid honeypot framework that combines low and high interaction honeypots for network security
Randomized Malleable C2
Penetration Testing
Randomized Malleable C2 Profiles Made Easy on SecurityListing: Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
Kojoney
Security Operations
Kojoney on SecurityListing: A honeypot for the SSH Service
Graylog AI-Powered Security
API Security
Graylog AI-Powered Security on SecurityListing: AI-powered SIEM, API security, and log management platform
Guardpot AI-Powered Cyber
Threat Intelligence Platforms
Guardpot AI-Powered Cyber Deception on SecurityListing: AI-powered deception platform using honeypots to detect & disrupt attacks
WinHex
Digital Forensics and Incident Response
WinHex on SecurityListing: Universal hexadecimal editor for computer forensics, data recovery, and IT security.
Acronis Cyber Protect
Data Loss Prevention
Acronis Cyber Protect Cloud on SecurityListing: Cloud-based XDR platform for MSPs with AI-guided detection and response
AfterGlow
Threat Hunting
AfterGlow on SecurityListing: Visualize and analyze network relationships with AfterGlow
Axence ConnectPro
Digital Forensics and Incident Response
Axence ConnectPro on SecurityListing: Remote access and IT support tool for workstation management and diagnostics
AxoFlow AxoRouter
Data Classification
AxoFlow AxoRouter on SecurityListing: Security data pipeline platform for collection, routing, and processing
Bleeping Computer
Offensive Security
Bleeping Computer on SecurityListing: A customizable offensive security reporting solution for pentesters and red teamers to generate detailed reports of their findings and vulnerabilities.
Blumira SOC Auto-Focus
Endpoint Detection and Response
Blumira SOC Auto-Focus on SecurityListing: XDR platform with AI-enhanced SIEM, automated response, and endpoint visibility
Censys Threat Hunting
Threat Hunting
Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure
CSIS Managed Detection
Brand Protection
CSIS Managed Detection & Response on SecurityListing: MDR service with threat intel, digital risk protection, and incident response
D3 Security Morpheus
Threat Hunting
D3 Security Morpheus AI on SecurityListing: AI-powered autonomous SOC platform for alert triage and investigation automation
Gradient Cyber MXDR
Threat Hunting
Gradient Cyber MXDR on SecurityListing: Managed XDR service with 24/7 SOC for mid-market threat detection & response
Huntress Managed SIEM
Threat Hunting
Huntress Managed SIEM on SecurityListing: Managed SIEM with 24/7 AI-assisted SOC for threat detection and compliance
Lab of a
Offensive Security
Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory on SecurityListing: Abusing DNSAdmins privilege for escalation in Active Directory
Leveraging INF-SCT Fetch
Offensive Security
Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2) on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
Netsurion Managed Detection
Threat Hunting
Netsurion Managed Detection and Response on SecurityListing: MDR service with 24x7 SOC, XDR platform, and threat hunting capabilities
MaxxMDR MDR +
Threat Hunting
MaxxMDR MDR + NDR on SecurityListing: Managed detection & response with network detection & response capabilities
ORNA End-to-End AI
Threat Intelligence Platforms
ORNA End-to-End AI Cyber Incident Response Platform on SecurityListing: AI-powered cyber incident response platform for training, orchestration & mgmt
PAGO DeepACT
Threat Hunting
PAGO DeepACT on SecurityListing: MDR platform combining threat detection, hunting, and real-time containment
Rewterz XDR
Threat Intelligence Platforms
Rewterz XDR on SecurityListing: XDR platform for threat monitoring, detection, and response across environments
SECUINFRA Cyber Defense
Managed Detection and Response
SECUINFRA Cyber Defense on SecurityListing: German MDR & IR provider offering 24/7 threat detection and incident response
Securonix Unified Defense
Threat Intelligence Platforms
Securonix Unified Defense SIEM on SecurityListing: Cloud-native SIEM platform with UEBA, SOAR, TIP, and TDIR capabilities
Sophos Central
Multi-Factor Authentication and Single Sign-On
Sophos Central on SecurityListing: Cloud-based platform for unified mgmt of Sophos security solutions
Stellar Cyber Multi-Layer
Threat Hunting
Stellar Cyber Multi-Layer AI™ on SecurityListing: AI-driven XDR platform with detection, correlation, investigation, and response
Sucuri Website Malware
Digital Forensics and Incident Response
Sucuri Website Malware Removal & Protection on SecurityListing: Website malware removal service with WAF, monitoring, and cleanup support
Sumo Logic Cloud
Threat Hunting
Sumo Logic Cloud SIEM on SecurityListing: Cloud-native SIEM for real-time threat detection and investigation
Talion Managed Detection
Threat Hunting
Talion Managed Detection & Response (MDR) on SecurityListing: 24/7 MDR service with threat hunting, containment, and SOC collaboration
syslog-ng Store Box
Security Information and Event Management
syslog-ng Store Box on SecurityListing: Enterprise log management appliance for collecting, indexing, and searching logs
TENEX Incident Response
Threat Hunting
TENEX Incident Response on SecurityListing: AI-driven MDR service with automated incident response and threat detection
StrangeBee TheHive IaaS
Security Orchestration Automation and Response
StrangeBee TheHive IaaS Images on SecurityListing: Collaborative case management platform for incident response and investigation
Tines Platform
Security Orchestration Automation and Response
Tines Platform on SecurityListing: Workflow automation platform for building and monitoring security workflows
Todyl Managed eXtended
Endpoint Detection and Response
Todyl Managed eXtended Detection & Response on SecurityListing: 24/7 managed XDR service with SOC, threat hunting, and dedicated analysts
Todyl Unified Platform
Managed Detection and Response
Todyl Unified Platform on SecurityListing: Unified cybersecurity platform for MSPs with SASE, EDR, SIEM, MXDR, and GRC
Torq Hyperautomation
Threat Intelligence Platforms
Torq Hyperautomation on SecurityListing: Security hyperautomation platform for SOC workflow automation with AI agents
UTMStack Real-time SIEM
Extended Detection and Response
UTMStack Real-time SIEM & XDR on SecurityListing: Open source SIEM and XDR platform for real-time threat detection and response
Windows Oneliners for
Offensive Security
Windows Oneliners for Remote Code Execution on SecurityListing: Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.
xenex xenexFoundation
API Security
xenex xenexFoundation on SecurityListing: Cloud-based Security Operations-as-a-Service with XDR engine and 700+ connectors
Webhacking.kr
Vulnerability Assessment
Webhacking.kr on SecurityListing: Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.
RTIR
Digital Forensics and Incident Response
RTIR on SecurityListing: Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.
Cribl Edge
Security Information and Event Management
Cribl Edge on SecurityListing: Vendor-neutral agent for unified telemetry collection across distributed infra
SOAR
Threat Hunting
SOAR on SecurityListing: A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.
ORNA Breach Response
Digital Forensics and Incident Response
ORNA Breach Response & Digital Forensics on SecurityListing: 24/7 breach response and digital forensics service for incident handling
The DFIR Report
Threat Intelligence Platforms
The DFIR Report on SecurityListing: In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
Netenrich Resolution Intelligence
Threat Hunting
Netenrich Resolution Intelligence Cloud on SecurityListing: Cloud-native data analytics platform for security and digital ops management
Radiant Agentic AI
Threat Hunting
Radiant Agentic AI on SecurityListing: AI-powered SOC platform for automated alert triage, incident response & logging
NetWitness Threat Detection
Endpoint Detection and Response
NetWitness Threat Detection & Response on SecurityListing: XDR platform combining NDR, EDR, SIEM, SOAR & UEBA for threat detection
Company Chat Widget
Threat Hunting
Company Chat Widget on SecurityListing: Managed Detection and Response service provider
Performanta Safe XDR
Extended Detection and Response
Performanta Safe XDR on SecurityListing: XDR service for continuous threat exposure management and automated response
Reveald ManagedDetection and
Threat Hunting
Reveald ManagedDetection and Response on SecurityListing: MDR service for CrowdStrike, Microsoft, and Trellix endpoints with 24/7 monitoring
Redline
Digital Forensics and Incident Response
Redline on SecurityListing: A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.
Reverse Engineering HID
Offensive Security
Reverse Engineering HID iClass Master Keys on SecurityListing: Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.
Senseon Intelligence Cloud
Threat Hunting
Senseon Intelligence Cloud on SecurityListing: AI-driven SIEM alternative with managed SOC for threat detection and response
Sumo Logic Application
Security Information and Event Management
Sumo Logic Application Modernization on SecurityListing: Cloud-based log analytics & monitoring platform for app modernization
Sumo Logic Logs
Security Information and Event Management
Sumo Logic Logs for Security on SecurityListing: Cloud-based log analytics platform for security monitoring and threat detection
The Sleuth Kit
Digital Forensics and Incident Response
The Sleuth Kit & Autopsy on SecurityListing: Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.
SCADA HoneyNet Project
Network Security
SCADA HoneyNet Project on SecurityListing: Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.
Strengthen Your Phishing
Offensive Security
Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection on SecurityListing: A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions
SimSpace Attack Catalog
Cyber Range Training
SimSpace Attack Catalog on SecurityListing: Catalog of simulated attack scenarios for cyber defense training and validation
Stellar Cyber Multi-Layered
Extended Detection and Response
Stellar Cyber Multi-Layered AI Platform on SecurityListing: AI-driven Open XDR platform for MSSPs with multi-tenancy and automation
WebDAV Covert Channel
Offensive Security
WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
Theos Managed Threat
Threat Hunting
Theos Managed Threat Detection & Response on SecurityListing: 24/7 managed threat detection and response service with SOC monitoring
ThreatSpike Blue
Endpoint Detection and Response
ThreatSpike Blue on SecurityListing: Managed detection and response platform with EDR, email, network, and cloud security
Trellix Wise Tour
Endpoint Detection and Response
Trellix Wise Tour on SecurityListing: Interactive product tours for Trellix security platform and products
SIRP OmniSense™
Threat Intelligence Platforms
SIRP OmniSense™ on SecurityListing: AI-native autonomous SOC platform for threat detection and response
SolarWinds Observability
Database Security
SolarWinds Observability on SecurityListing: Unified observability platform for IT infrastructure, apps, and databases
The Security Ledger
Offensive Security
The Security Ledger on SecurityListing: Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.
Stackstorm
Security Orchestration Automation and Response
Stackstorm on SecurityListing: StackStorm is an open-source automation platform that connects and automates DevOps workflows and integrates with existing infrastructure.
Tracebit Dynamic Security
Cloud Security
Tracebit Dynamic Security Canaries on SecurityListing: Cloud-native deception platform deploying dynamic security canaries
Graylog SIEM
API Security
Graylog SIEM on SecurityListing: AI-powered SIEM platform for security operations, log management, and API security
Simbian AI Threat
Threat Hunting
Simbian AI Threat Hunt Agent on SecurityListing: AI agent that autonomously validates threat hunt hypotheses across enterprise data
ServiceNow Security Operations
Threat Intelligence Platforms
ServiceNow Security Operations on SecurityListing: Platform for automating threat and vulnerability mgmt with incident response
Simbian AI SOC
Security Orchestration Automation and Response
Simbian AI SOC Agent on SecurityListing: AI agent that autonomously investigates, triages, and responds to security alerts
Tao Security
Offensive Security
Tao Security on SecurityListing: Sysreptor provides a customizable reporting platform for pentesters and red teamers to efficiently document security assessments.
StrangeBee TheHive Cloud
Security Orchestration Automation and Response
StrangeBee TheHive Cloud Platform on SecurityListing: SaaS security case management platform for incident response teams
testdisk
Digital Forensics and Incident Response
testdisk on SecurityListing: TestDisk is a free data recovery software that can recover lost partitions and undelete files from various file systems.
WindowsSCOPE
Digital Forensics and Incident Response
WindowsSCOPE on SecurityListing: A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
Sumo Logic Monitoring
Security Information and Event Management
Sumo Logic Monitoring and Troubleshooting on SecurityListing: Log analytics platform for monitoring, troubleshooting, and issue detection
Sumo Logic Dojo
Security Information and Event Management
Sumo Logic Dojo AI on SecurityListing: Cloud SIEM platform with AI-powered security analytics and automation
Trellix Security Platform
Threat Intelligence Platforms
Trellix Security Platform on SecurityListing: AI-powered security platform for detection, response, and threat protection
syslog-ng Open Source
Security Information and Event Management
syslog-ng Open Source Edition on SecurityListing: Open-source log collection, processing, and forwarding tool for log management
syslog-ng
Security Information and Event Management
syslog-ng on SecurityListing: A log management solution that optimizes SIEM performance, provides rapid search and troubleshooting, and meets compliance requirements.
syslog-ng Premium Edition
Database Security
syslog-ng Premium Edition on SecurityListing: Enterprise log management software for collecting and centralizing log data
tcpxtract
Digital Forensics and Incident Response
tcpxtract on SecurityListing: A tool for extracting files from network traffic based on file signatures with support for various file formats and scalable search algorithm.
WinDbg
Digital Forensics and Incident Response
WinDbg on SecurityListing: Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.
Seceon aiSIEM CGuard
Security Information and Event Management
Seceon aiSIEM CGuard 2.0 on SecurityListing: AI-powered SIEM for cloud security across Microsoft 365, Azure, AWS, and GCP
Theos Red Teaming
Offensive Security
Theos Red Teaming on SecurityListing: Red teaming service simulating real-world adversary attacks on organizations.
Seceon OTM Platform
Extended Detection and Response
Seceon OTM Platform on SecurityListing: All-in-one platform combining SIEM, XDR, SOAR with AI/ML threat detection
Seceon aiXDR-PMAX
Data Loss Prevention
Seceon aiXDR-PMAX on SecurityListing: XDR platform with endpoint protection, detection, and automated response
CrowdStrike Falcon Next-Gen
Threat Intelligence Platforms
CrowdStrike Falcon Next-Gen SIEM on SecurityListing: AI-native SIEM platform for consolidating security tools and data
Simbian AI Security
Penetration Testing
Simbian AI Security Operations on SecurityListing: AI-powered security operations platform for autonomous alert triage & response
Tracecat
Security Orchestration Automation and Response
Tracecat on SecurityListing: Open-source security automation platform for automating security alerts and building AI-assisted workflows.
SolarWinds Incident Response
Digital Forensics and Incident Response
SolarWinds Incident Response on SecurityListing: Incident response platform for alert management, collaboration, and remediation
Torq HyperSOC
Security Orchestration Automation and Response
Torq HyperSOC on SecurityListing: AI-powered SOC platform for autonomous alert triage, investigation & response
SimSpace Cyber Range
Cyber Range Training
SimSpace Cyber Range on SecurityListing: Cyber range platform for training, testing, and validating security readiness
Trellix Wise
Endpoint Detection and Response
Trellix Wise on SecurityListing: GenAI-powered security operations platform for automated alert investigation
Cymph Security Playbooks
Security Orchestration Automation and Response
Cymph Security Playbooks on SecurityListing: A vendor-agnostic product for managing and analyzing cybersecurity playbooks.
Stellar Cyber AI-Based
Extended Detection and Response
Stellar Cyber AI-Based Open XDR on SecurityListing: AI-based Open XDR platform integrating NDR, AD, and FW for threat detection
Tines AI-driven SOC
Security Orchestration Automation and Response
Tines AI-driven SOC on SecurityListing: AI-driven workflow automation platform for SOC operations and security tasks
Vshadow
Offensive Security
Vshadow on SecurityListing: A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.
VX-Underground
Threat Intelligence Platforms
VX-Underground on SecurityListing: VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.
WebMax Tools Privacy
Digital Forensics and Incident Response
WebMax Tools Privacy Encoders / Decoders / Hash Generators on SecurityListing: Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.
Workshop Hacking Bluetooth
Offensive Security
Workshop Hacking Bluetooth Smart locks on SecurityListing: A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.
xxd
Digital Forensics and Incident Response
xxd on SecurityListing: A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
Sekoia Cyber Threat
Threat Intelligence Platforms
Sekoia Cyber Threat Intelligence on SecurityListing: CTI platform providing structured threat intelligence and analysis
Reveald ManagedExtended Detection
Threat Hunting
Reveald ManagedExtended Detection and Response XDR on SecurityListing: Managed XDR service built on CrowdStrike Falcon LogScale platform
Stellar Cyber Human-Augmented
Extended Detection and Response
Stellar Cyber Human-Augmented Autonomous SOC on SecurityListing: AI-native SecOps platform combining SIEM, XDR, NDR, ITDR, and UEBA capabilities
tcpick
Digital Forensics and Incident Response
tcpick on SecurityListing: A textmode sniffer for tracking tcp streams and capturing data in various modes.
tcpkill
Penetration Testing
tcpkill on SecurityListing: A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
Seceon aiSIEM
Security Information and Event Management
Seceon aiSIEM on SecurityListing: AI-powered SIEM with automated threat detection and response capabilities
SimSpace Cyber Range
Threat Intelligence Platforms
SimSpace Cyber Range Platform on SecurityListing: Cyber range platform for training, testing, and validating security controls.
StrangeBee TheHive
Security Orchestration Automation and Response
StrangeBee TheHive on SecurityListing: Security case management platform for SOCs, CERTs, and CSIRTs
Logpoint SIEM
Security Information and Event Management
Logpoint SIEM on SecurityListing: A security information and event management solution that collects, normalizes, and analyzes log data from across an organization's infrastructure to enhance threat detection and compliance reporting.
win10upgrade
Threat Intelligence Platforms
win10upgrade on SecurityListing: MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.
Exabeam Security Operations
Security Information and Event Management
Exabeam Security Operations Platform on SecurityListing: Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.
Project Honey Pot
Security Operations
Project Honey Pot on SecurityListing: The Web's Largest Community Tracking Online Fraud & Abuse
OWASP Bricks
Penetration Testing
OWASP Bricks on SecurityListing: Deliberately vulnerable web application for security professionals to practice attack techniques.
Using a SCF
Offensive Security
Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.
Security Intelligence
Offensive Security
Security Intelligence on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
UPX
Offensive Security
UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.
ClickOnce (Twice or
Penetration Testing
ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution on SecurityListing: A technique for social engineering and untrusted command execution using ClickOnce technology
DDE attack with
Offensive Security
DDE attack with PowerShell Empire on SecurityListing: Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
Sigma Query
Threat Hunting
Sigma Query on SecurityListing: Searchable repository of Sigma detection rules for threat hunting and SIEM
Slavehack 2
Cyber Range Training
Slavehack 2 on SecurityListing: Online hacking game with realistic hacking experience and player interaction.
snmpcheck
Offensive Security
snmpcheck on SecurityListing: A tool for enumerating information via SNMP protocol.
SecGame #1: Sauron
Penetration Testing
SecGame #1: Sauron on SecurityListing: A Linux-based environment for penetration testing and vulnerability exploitation
ThisisLegal.com
Cyber Range Training
ThisisLegal.com on SecurityListing: Hacker wargames site with forums and tutorials, fostering a learning community.
Troy Hunt
Offensive Security
Troy Hunt on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Windows 7 UAC
API Security
Windows 7 UAC Whitelist Code-Injection Issue on SecurityListing: Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.
Serving Random Payloads
Penetration Testing
Serving Random Payloads with Apache mod_rewrite on SecurityListing: A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks
WayBackMachine
Digital Forensics and Incident Response
WayBackMachine on SecurityListing: A digital archive of the internet, allowing users to capture and browse archived web pages.
PowerUpSQL
Penetration Testing
PowerUpSQL on SecurityListing: Tool for attacking Active Directory environments through SQL Server access.
ResourcesExtract
Digital Forensics and Incident Response
ResourcesExtract on SecurityListing: Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files
Steghide
Digital Forensics and Incident Response
Steghide on SecurityListing: Steghide is a steganography program for hiding data in image and audio files.
Trust Direction: An
Offensive Security
Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation
Tracking a stolen
Digital Forensics and Incident Response
Tracking a stolen code-signing certificate with osquery on SecurityListing: Detect signed malware and track stolen code-signing certificates using osquery.
MFT Parsers Review
Digital Forensics and Incident Response
MFT Parsers Review on SecurityListing: Review of various MFT parsers used in digital forensics for analyzing NTFS file systems.
WeChall
Cyber Range Training
WeChall on SecurityListing: A free online wargame for practicing hacking skills and learning security concepts.
Wifislax
Penetration Testing
Wifislax on SecurityListing: GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
X-Ways Forensics
Digital Forensics and Incident Response
X-Ways Forensics on SecurityListing: Advanced computer forensics software with efficient features.
XSS'OR
Offensive Security
XSS'OR on SecurityListing: Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.
Ranges – Cyber
Cyber Range Training
Ranges – Cyber Warfare Range LLC on SecurityListing: A network of physical and online cyber warfare ranges for training and testing
tcpreplay
Offensive Security
tcpreplay on SecurityListing: Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.
Preparing for Red
Penetration Testing
Preparing for Red Team at PRCCDC 2015 on SecurityListing: Preparation process for participating in the Pacific Rim CCDC 2015.
Timeline Explorer v0.4.0.0
Digital Forensics and Incident Response
Timeline Explorer v0.4.0.0 on SecurityListing: A powerful tool for analyzing and visualizing system activity timelines.
7AI Platform
Threat Hunting
7AI Platform on SecurityListing: Autonomous AI agents for security alert investigation and response automation