Security Operations
Browse 379 cybersecurity tools tagged with "Security Operations"

Damn Vulnerable iOS
Penetration Testing
Damn Vulnerable iOS App (DVIA) on SecurityListing: iOS application for testing iOS penetration testing skills in a legal environment.

CBRX
Digital Forensics and Incident Response
CBRX on SecurityListing: CBRX is a cloud-based platform that automates incident analysis and reporting for cybersecurity teams.

Monkey-Spider
Security Operations
Monkey-Spider on SecurityListing: A crawler-based low-interaction client honeypot for exposing website threats.

ProLion CryptoSpike
Extended Detection and Response
ProLion CryptoSpike on SecurityListing: Real-time ransomware detection & blocking for storage systems with recovery

Reverse Engineering Challenges
Cyber Range Training
Reverse Engineering Challenges on SecurityListing: A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

Logsign Unified SO
Threat Hunting
Logsign Unified SO Platform on SecurityListing: SOAR platform automating threat detection, incident response, and workflows

xargs
Offensive Security
xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

Attack-Defense Online Lab
Vulnerability Assessment
Attack-Defense Online Lab on SecurityListing: Hands-on cybersecurity training and testing platform with 1800+ labs

Metadefender Cloud
Digital Forensics and Incident Response
Metadefender Cloud on SecurityListing: Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.

DorkSearch
Offensive Security
DorkSearch on SecurityListing: An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.

Cipher xMDR
Threat Hunting
Cipher xMDR on SecurityListing: AI-driven MDR service providing unified threat detection across IT, OT, cloud

Art of Memory
Digital Forensics and Incident Response
Art of Memory Forensics on SecurityListing: A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.

DuskRise Security Dashboard
Security Information and Event Management
DuskRise Security Dashboard on SecurityListing: Security dashboard for remote network visibility and policy enforcement

Mandiant Threat Defense
Threat Hunting
Mandiant Threat Defense on SecurityListing: Managed threat detection, hunting, and response service by Mandiant experts

Anvilogic
Security Information and Event Management
Anvilogic on SecurityListing: Anvilogic is a SIEM platform that streamlines detection engineering, offers cost-effective data management, and enhances threat detection capabilities.

Intrusion Detection Honeypots
Network Security
Intrusion Detection Honeypots on SecurityListing: A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.

Cobalt Strike HTTP
Offensive Security
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

AccessData FTK Imager
Digital Forensics and Incident Response
AccessData FTK Imager on SecurityListing: A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.

exif
Digital Forensics and Incident Response
exif on SecurityListing: A command-line utility to show and change EXIF information in JPEG files

LogCraft Detection Engineering
Endpoint Detection and Response
LogCraft Detection Engineering on SecurityListing: Detection-as-code platform for managing detection rules across SIEM/EDR/XDR

D3 Morpheus AI
Threat Intelligence Platforms
D3 Morpheus AI SOC on SecurityListing: AI-driven SOC platform for automated alert triage, investigation, and response

ESET Protect MDR
Threat Hunting
ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.

PEview
Digital Forensics and Incident Response
PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

PentesterLab PRO
Penetration Testing
PentesterLab PRO on SecurityListing: Online platform offering 700+ hands-on web security exercises and training

Honeyd Tools
Security Operations
Honeyd Tools on SecurityListing: A collection of tools that can be used with Honeyd for data analysis or other purposes

LAMPSecurity Training
Penetration Testing
LAMPSecurity Training on SecurityListing: A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.

Nomoreransom
Digital Forensics and Incident Response
Nomoreransom on SecurityListing: No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.

Kali
Vulnerability Assessment
Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

Lumifi ShieldVision™
Endpoint Detection and Response
Lumifi ShieldVision™ on SecurityListing: SOAR platform with investigation, automation, and incident mgmt capabilities

Brute Ratel C4
Offensive Security
Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

Dropzone AI
Security Orchestration Automation and Response
Dropzone AI on SecurityListing: Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.

Lab of a
Offensive Security
Lab of a Penetration Tester: Week of Evading Microsoft ATA on SecurityListing: A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection

Event Log Explorer
Security Information and Event Management
Event Log Explorer on SecurityListing: Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.

Combatting Incident Responders
Offensive Security
Combatting Incident Responders with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.

Capsicum
Container Security
Capsicum on SecurityListing: A security framework for process isolation and sandboxing based on capability-based security principles.

ParrotSec
Offensive Security
ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

Logz.io Distributed Tracing
Security Information and Event Management
Logz.io Distributed Tracing on SecurityListing: Distributed tracing platform for monitoring microservices performance

Zenduty
Security Orchestration Automation and Response
Zenduty on SecurityListing: Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.

BeEF
Penetration Testing
BeEF on SecurityListing: BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.

Logpoint SecOps Platform
Security Information and Event Management
Logpoint SecOps Platform on SecurityListing: Integrated SIEM, SOAR, NDR platform with central fleet management capabilities

PoshC2
Penetration Testing
PoshC2 on SecurityListing: A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

ORDR IQ
Security Orchestration Automation and Response
ORDR IQ on SecurityListing: Multi-agent AI orchestrator for IT and security workflow automation

Blockbit XDR
Threat Intelligence Platforms
Blockbit XDR on SecurityListing: XDR platform providing detection and response across endpoints, networks, and email

CyberCPR
Digital Forensics and Incident Response
CyberCPR on SecurityListing: Incident response and case management solution for efficient incident response and management.

RAD Security RAD
Security Orchestration Automation and Response
RAD Security RAD FusionAI Core on SecurityListing: AI-powered security platform that correlates signals & automates actions

Covert Red Team
Offensive Security
Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.

Contagio Mobile
Digital Forensics and Incident Response
Contagio Mobile on SecurityListing: A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

Abusing the COM
Offensive Security
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 on SecurityListing: Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

Binalyze AIR
Digital Forensics and Incident Response
Binalyze AIR on SecurityListing: Modern digital forensics and incident response platform with comprehensive tools.

Belkasoft X Forensic
Digital Forensics and Incident Response
Belkasoft X Forensic on SecurityListing: A reliable end-to-end DFIR solution for boosting cyber incident response and forensics capacity.

detections.ai Detections
Threat Intelligence Platforms
detections.ai Detections on SecurityListing: Community platform for sharing and creating detection rules with AI

CrowdStrike Community Tools
Digital Forensics and Incident Response
CrowdStrike Community Tools on SecurityListing: Free tools for the CrowdStrike customer community to support their use of the Falcon platform.

Purple Academy by
Cyber Range Training
Purple Academy by Picus on SecurityListing: Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.

Intelligence-Driven Incident Response
Digital Forensics and Incident Response
Intelligence-Driven Incident Response on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.

Abusing DCOM For
Offensive Security
Abusing DCOM For Yet Another Lateral Movement Technique on SecurityListing: An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.
Practical Memory Forensics
Digital Forensics and Incident Response
Practical Memory Forensics on SecurityListing: A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.

Enterprise Detection &
Threat Hunting
Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response

State of Security
Offensive Security
State of Security on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

HoneyDrive
Security Operations
HoneyDrive on SecurityListing: HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

BitLyft True MDR
Threat Hunting
BitLyft True MDR on SecurityListing: 24/7 managed detection and response service with US-based SOC analysts

Hunters Next-Gen SIEM
Threat Hunting
Hunters Next-Gen SIEM on SecurityListing: Next-gen SIEM with AI-powered triage, automated investigation & detection

0xf.at Hackits
Cyber Range Training
0xf.at Hackits on SecurityListing: Solve password-riddles on a website without logins or ads.

Prophet Security Prophet
Security Orchestration Automation and Response
Prophet Security Prophet AI SOC Analyst on SecurityListing: AI-powered SOC analyst that automates alert triage and investigation

BitLyft AIR®
Security Orchestration Automation and Response
BitLyft AIR® on SecurityListing: Automated incident response platform for Microsoft 365 and identity systems

GNU Netcat
Offensive Security
GNU Netcat on SecurityListing: A featured networking utility for reading and writing data across network connections with advanced capabilities.

Prophet Security Prophet
Threat Hunting
Prophet Security Prophet AI Threat Hunter on SecurityListing: AI-driven threat hunting platform for SOC alert triage and investigation

IonX Verisys FIM
Security Information and Event Management
IonX Verisys FIM on SecurityListing: File integrity monitoring for Windows, Linux & network devices

Quorum Cyber Emergency
Threat Hunting
Quorum Cyber Emergency MDR on SecurityListing: Emergency MDR service for orgs experiencing active cyber incidents or attacks

IO Wargame
Cyber Range Training
IO Wargame on SecurityListing: Frontpage of the IO wargame with various versions and connection details.

Perisai Agentic-AI Hyperautomation
Endpoint Detection and Response
Perisai Agentic-AI Hyperautomation on SecurityListing: AI-driven SOAR platform for automated incident response & threat detection

Hunters Pathfinder AI
Threat Hunting
Hunters Pathfinder AI on SecurityListing: AI-driven SOC platform with autonomous threat detection, investigation & response

Graylog AI-Powered Security
API Security
Graylog AI-Powered Security & IT Operations on SecurityListing: AI-powered SIEM, API security, and log management platform

DNS Tunnelling
Offensive Security
DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.

Logsign USO Platform
Security Information and Event Management
Logsign USO Platform on SecurityListing: SIEM platform with compliance reporting for regulatory standards

NetWitness Cybersecurity
Endpoint Detection and Response
NetWitness Cybersecurity on SecurityListing: Integrated XDR platform combining NDR, SIEM, EDR, and SOAR capabilities

HoneyView
Security Operations
HoneyView on SecurityListing: HoneyView is a tool for analyzing honeyd logfiles graphically and textually.

OODA-driven SOC Strategy
Endpoint Detection and Response
OODA-driven SOC Strategy on SecurityListing: Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.

Agentic AI AR2™
Threat Intelligence Platforms
Agentic AI AR2™ on SecurityListing: Autonomous AI SOC platform for automated threat response and remediation

Bait and Switch
Security Operations
Bait and Switch Honeypot on SecurityListing: An active and aggressive honeypot tool for network security.

Bifrozt
Security Operations
Bifrozt on SecurityListing: High interaction honeypot solution for Linux systems with data control and integrity features.

cabextract
Digital Forensics and Incident Response
cabextract on SecurityListing: Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.

Userland API Monitoring
Digital Forensics and Incident Response
Userland API Monitoring and Code Injection Detection on SecurityListing: Explores malware interaction with Windows API and methods for detection and prevention.

Coro Cybersecurity
Security Awareness Training
Coro Cybersecurity on SecurityListing: Unified cybersecurity platform with modular security controls and AI engine

Daylight Threat Detection
Threat Hunting
Daylight Threat Detection and Response on SecurityListing: AI-powered MDR combining agentic AI with human expertise for threat detection

LastActivityView
Digital Forensics and Incident Response
LastActivityView on SecurityListing: A tool that collects and displays user activity and system events on a Windows system.

Gravwell Security Data
Threat Hunting
Gravwell Security Data Platform on SecurityListing: Security data platform for log analysis, metrics, and threat hunting

Dynatrace
Security Information and Event Management
Dynatrace on SecurityListing: Unified observability and security platform with AI-powered analytics

Reversing and Exploiting
Offensive Security
Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

NSFOCUS Intelligent Security
Threat Hunting
NSFOCUS Intelligent Security Operations Platform on SecurityListing: XDR platform with SOAR capabilities for security operations centers

Fraud.com fcase Fraud
API Security
Fraud.com fcase Fraud Orchestration on SecurityListing: Fraud orchestration platform for financial institutions

Threat.Zone
Digital Forensics and Incident Response
Threat.Zone on SecurityListing: Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

Cydarm Platform
Security Orchestration Automation and Response
Cydarm Platform on SecurityListing: SOC management platform for incident response and cyber response management

HoneyDB
Threat Hunting
HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

Cobalt Strike's ExternalC2
Penetration Testing
Cobalt Strike's ExternalC2 framework on SecurityListing: A specification/framework for extending default C2 communication channels in Cobalt Strike

Logpoint Director
Security Information and Event Management
Logpoint Director on SecurityListing: A centralized management console for efficiently operating and monitoring large-scale, multitenant Logpoint SIEM deployments across customers, geographies, and organizational divisions.

Positive Hack Days
Cyber Range Training
Positive Hack Days Fest on SecurityListing: International cybersecurity festival for all, who wants to dive into the world of cyber security and have a great time.

Threatpost
Offensive Security
Threatpost on SecurityListing: Sysreptor offers a customizable reporting solution for penetration testing and red teaming.

Aircrack-ng
Offensive Security
Aircrack-ng on SecurityListing: A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.

StrangeBee Cortex
Security Orchestration Automation and Response
StrangeBee Cortex on SecurityListing: Open-source observable analysis engine and companion tool for TheHive platform

Quorum Cyber Clarity
Data Loss Prevention
Quorum Cyber Clarity on SecurityListing: Managed security services platform offering MDR, threat detection, and DLP

Zeronsec Anrita
Threat Hunting
Zeronsec Anrita on SecurityListing: Real-time threat detection and monitoring platform with SIEM capabilities

Belkasoft Evidence Center
Digital Forensics and Incident Response
Belkasoft Evidence Center on SecurityListing: Comprehensive digital forensics and incident response platform for law enforcement, corporate, and academic institutions.

GHH - Google
Security Operations
GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

FEX Imager™
Digital Forensics and Incident Response
FEX Imager™ on SecurityListing: Forensic imaging program with full hash authentication and various acquisition options.

Attic MDR
Threat Hunting
Attic MDR on SecurityListing: 24/7 managed detection and response service for Microsoft 365 environments

Fabric Platform by
Security Information and Event Management
Fabric Platform by BlackStork on SecurityListing: Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.

ExoneraTor
Digital Forensics and Incident Response
ExoneraTor on SecurityListing: Check if an IP address was used as a Tor relay on a given date.

Executing Commands and
Offensive Security
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts on SecurityListing: A blog post about bypassing AppLocker using PowerShell diagnostic scripts

KFSensor
Penetration Testing
KFSensor on SecurityListing: KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.

Coralogix DataPrime Engine
Security Information and Event Management
Coralogix DataPrime Engine on SecurityListing: Observability platform with unified query engine for logs, metrics, and traces

DEF CON CTF
Container Security
DEF CON CTF Archive on SecurityListing: A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.

MFTECmd
Digital Forensics and Incident Response
MFTECmd on SecurityListing: A command-line tool for managing and analyzing Microsoft Forefront TMG and UAG configurations.

DVWA - Brute
Offensive Security
DVWA - Brute Force (High Level) - Anti-CSRF Tokens on SecurityListing: A guide to brute forcing DVWA on the high security level with anti-CSRF tokens

Grafana Cloud Logs
Security Information and Event Management
Grafana Cloud Logs on SecurityListing: Managed log aggregation system for storing and querying application logs

How to Write
Offensive Security
How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

PhotoRec
Digital Forensics and Incident Response
PhotoRec on SecurityListing: A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.

Daniel Miessler/Unsupervised Learning
Offensive Security
Daniel Miessler/Unsupervised Learning on SecurityListing: Sysreptor offers a customizable reporting solution for offensive security assessments.

PAGO Networks PAGO
Endpoint Detection and Response
PAGO Networks PAGO MDR on SecurityListing: MDR service with real-time monitoring and threat response capabilities

hackxor
Cyber Range Training
hackxor on SecurityListing: A platform offering hacking missions to test and enhance skills.

Panaseer Metrics Measurement
Risk Assessment
Panaseer Metrics Measurement on SecurityListing: Automates security metrics measurement and reporting for posture management.

Huntbase Platform
Threat Hunting
Huntbase Platform on SecurityListing: Platform for threat investigation with automation and knowledge management

Fidelis Security
Endpoint Detection and Response
Fidelis Security on SecurityListing: XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities

With Secure Elements
Exposure Management
With Secure Elements Platform on SecurityListing: WithSecure Elements Cloud is a modular cybersecurity platform that combines AI-powered software and expert services to provide comprehensive protection across endpoints, identities, and cloud environments.

Verisys File Integirty
Security Information and Event Management
Verisys File Integirty Monitoring on SecurityListing: A next-generation file integrity monitoring and change detection system

Logsign Unified Security
Threat Intelligence Platforms
Logsign Unified Security Operations Platform on SecurityListing: Unified security operations platform combining SIEM, TI, UEBA, and TDIR

Ophcrack
Offensive Security
Ophcrack on SecurityListing: Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.

LogRythm SIEM
Security Information and Event Management
LogRythm SIEM on SecurityListing: LogRhythm SIEM is a comprehensive security information and event management platform that collects, analyzes, and responds to security events across an organization's IT infrastructure.

Graylog
Security Information and Event Management
Graylog on SecurityListing: Graylog offers advanced log management and SIEM capabilities to enhance security and compliance across various industries.

Grep App
Threat Hunting
Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

Logz.io Log Management
Security Information and Event Management
Logz.io Log Management on SecurityListing: Cloud-based log management platform with AI-driven analysis and observability

TechTarget
Offensive Security
TechTarget on SecurityListing: Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.

DFIR CTF: Precision
Cyber Range Training
DFIR CTF: Precision Widgets of North Dakota Intrusion on SecurityListing: A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.

Mandiant Managed Defense
Threat Hunting
Mandiant Managed Defense on SecurityListing: 24/7 managed threat detection, investigation, and response service

CrowdStrike Falcon Onum
Security Information and Event Management
CrowdStrike Falcon Onum on SecurityListing: Data pipeline mgmt for SOC transformation with real-time data processing

Devo Security Data
Threat Hunting
Devo Security Data Platform on SecurityListing: Security data platform combining SIEM, SOAR, UEBA, and threat hunting

DiskShadow
Offensive Security
DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

Impost
Network Security
Impost on SecurityListing: Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.

H3C U-Center Unified
Security Information and Event Management
H3C U-Center Unified O&M Cloud on SecurityListing: Unified O&M cloud platform for network and IT infrastructure management

Hybrid-Analysis
Threat Intelligence Platforms
Hybrid-Analysis on SecurityListing: Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.

Shuffler
Security Orchestration Automation and Response
Shuffler on SecurityListing: Shuffle Automation provides an open-source platform for security orchestration, automation, and response.

Logpoint SOAR &
Security Orchestration Automation and Response
Logpoint SOAR & Automation on SecurityListing: SOAR platform for automated alert triage, investigation, and response

Crowdstrike Charlotte AI
Extended Detection and Response
Crowdstrike Charlotte AI on SecurityListing: GenAI assistant that provides faster intelligence for security operations

Explorer Suite
Digital Forensics and Incident Response
Explorer Suite on SecurityListing: A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

ExploitDB
Penetration Testing
ExploitDB on SecurityListing: A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

Valkyrie Comodo
Digital Forensics and Incident Response
Valkyrie Comodo on SecurityListing: Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.

GNU Binutils
Digital Forensics and Incident Response
GNU Binutils on SecurityListing: A collection of binary tools for various purposes including linking, assembling, profiling, and more.

Itential Orchestration
API Security
Itential Orchestration on SecurityListing: AI-powered orchestration platform for network & infrastructure automation
Detecting Lateral Movement
Digital Forensics and Incident Response
Detecting Lateral Movement through Tracking Event Logs (Version 2) on SecurityListing: A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.

Lumifi Managed Detection
Endpoint Detection and Response
Lumifi Managed Detection & Response on SecurityListing: 24/7 MDR service with automated threat hunting and response capabilities

Proxmark III
Offensive Security
Proxmark III on SecurityListing: A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

Lumifi Network Detection
Managed Detection and Response
Lumifi Network Detection & Response (NDR) on SecurityListing: Managed NDR service monitoring network traffic for threats via co-managed model

Alien Vault Ossim
Vulnerability Assessment
Alien Vault Ossim on SecurityListing: AlienVault OSSIM provides an all-in-one security management solution with asset discovery, vulnerability assessment, and SIEM capabilities.

Harness AI for
Security Orchestration Automation and Response
Harness AI for DevOps on SecurityListing: AI-powered DevOps platform for CI/CD, testing, security, and cost mgmt.

Magnet ACQUIRE
Digital Forensics and Incident Response
Magnet ACQUIRE on SecurityListing: Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.

LaBrea
Penetration Testing
LaBrea on SecurityListing: LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.

Jupyter Notebooks for
Threat Hunting
Jupyter Notebooks for Threat Hunting on SecurityListing: Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.

Highlighter
Threat Hunting
Highlighter on SecurityListing: Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.

Heimdal Unified Cybersecurity
Endpoint Detection and Response
Heimdal Unified Cybersecurity Platform on SecurityListing: Unified cybersecurity platform with XDR, EDR, PAM, email security, and compliance

HIHAT - High
Threat Intelligence Platforms
HIHAT - High Interaction Honeypot Analysis Toolkit on SecurityListing: A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.

Prophet Security Prophet
Security Orchestration Automation and Response
Prophet Security Prophet AI on SecurityListing: AI-driven SOC platform for automated alert triage, investigation & response

Forensic Registry EDitor
Digital Forensics and Incident Response
Forensic Registry EDitor (FRED) on SecurityListing: A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.

dfir.org
Digital Forensics and Incident Response
dfir.org on SecurityListing: Andrew Case's personal page for research, software projects, and speaking events

PTJunior
Offensive Security
PTJunior on SecurityListing: AI agent that autonomously discovers, exploits, and documents vulnerabilities.

Empire Communication Profiles
Offensive Security
Empire Communication Profiles on SecurityListing: Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.

Metasploit Unleashed
Penetration Testing
Metasploit Unleashed on SecurityListing: Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

Caldera
Offensive Security
Caldera on SecurityListing: Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

Logsign SAP Security
Security Information and Event Management
Logsign SAP Security on SecurityListing: SIEM platform for SAP security monitoring and threat detection

Netdude
Digital Forensics and Incident Response
Netdude on SecurityListing: Network Dump data Displayer and Editor framework for tcpdump trace files manipulation.

Graylog Graylog
API Security
Graylog Graylog on SecurityListing: AI-powered SIEM, API security, and log management platform

Log Parser Lizard
Security Information and Event Management
Log Parser Lizard on SecurityListing: A dynamic GUI for advanced log analysis, allowing users to execute SQL queries on structured log data.

Axoflow Platform
Security Information and Event Management
Axoflow Platform on SecurityListing: Security data pipeline platform for collecting, curating, and routing logs

D3 Security Smart
Threat Intelligence Platforms
D3 Security Smart SOAR on SecurityListing: SOAR platform for security orchestration, automation, and incident response

BluSapphire SIEMless™ SIEM
Security Information and Event Management
BluSapphire SIEMless™ SIEM on SecurityListing: Distributed SIEM with edge processing, AI filtering, and autonomous response

JS NICE
Digital Forensics and Incident Response
JS NICE on SecurityListing: Statistical renaming, Type inference, and Deobfuscation tool for JavaScript code.

CyberSight Demo
Security Information and Event Management
CyberSight Demo on SecurityListing: Client-facing dashboard for cybersecurity posture visibility and monitoring

CyberMaxx MaxxMDR
Endpoint Detection and Response
CyberMaxx MaxxMDR on SecurityListing: MDR solution combining threat detection, response, and offensive security

Coro Platform
Data Loss Prevention
Coro Platform on SecurityListing: Unified cybersecurity platform with multiple security modules and single agent

Echotrail Insights
Digital Forensics and Incident Response
Echotrail Insights on SecurityListing: Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.

Golismero
Threat Hunting
Golismero on SecurityListing: A free and open-source OSINT framework for gathering and analyzing data from various sources

Java Decompiler Online
Offensive Security
Java Decompiler Online on SecurityListing: Online Java decompiler tool with support for modern Java features.

Binary Ninja
Digital Forensics and Incident Response
Binary Ninja on SecurityListing: Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

Logz.io Observability Platform
Security Information and Event Management
Logz.io Observability Platform on SecurityListing: Observability platform with log mgmt, metrics, tracing & AI-powered RCA

Gravwell
Security Information and Event Management
Gravwell on SecurityListing: Data analytics platform for security operations with search and automation

Operating System Based
Offensive Security
Operating System Based Redirection with Apache mod_rewrite on SecurityListing: Detect users' operating systems and perform redirection with Apache mod_rewrite.

Devo Platform
Threat Intelligence Platforms
Devo Platform on SecurityListing: Integrated SIEM, SOAR, and UEBA platform with AI-driven threat detection

bohops Leveraging INF-SCT
Offensive Security
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

Detecting the Elusive
Threat Hunting
Detecting the Elusive - Active Directory Threat Hunting on SecurityListing: A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

D3 Smart SOAR
Threat Hunting
D3 Smart SOAR on SecurityListing: SOAR platform with automated threat hunting and investigation capabilities

DNIF HYPERCLOUD
Threat Hunting
DNIF HYPERCLOUD on SecurityListing: SIEM platform with user analytics and automation for threat detection

Viper
Digital Forensics and Incident Response
Viper on SecurityListing: A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.

Fraud.com aiReflex
Risk Assessment
Fraud.com aiReflex on SecurityListing: AI-powered fraud detection platform for transaction monitoring and prevention

Honeybrid
Network Security
Honeybrid on SecurityListing: A hybrid honeypot framework that combines low and high interaction honeypots for network security

LogRhythm Axon
Security Information and Event Management
LogRhythm Axon on SecurityListing: A cloud-native SIEM platform that provides security analytics, intuitive workflow, and simplified incident response to help security teams defend against cyber threats.

Quorum Cyber Clarity
Threat Hunting
Quorum Cyber Clarity Extend on SecurityListing: Managed detection and response service with 24/7 SOC monitoring

Hunters SOC Platform
Threat Hunting
Hunters SOC Platform on SecurityListing: Next-gen SIEM with AI-powered alert investigation and automated response

Lumifi Endpoint Detection
Endpoint Detection and Response
Lumifi Endpoint Detection & Response (EDR/XDR) on SecurityListing: Managed EDR/XDR service with 24/7 SOC monitoring and threat response

edb
Digital Forensics and Incident Response
edb on SecurityListing: edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.

Abusing Exported Functions
Offensive Security
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement on SecurityListing: A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

Graylog AI-Powered Security
API Security
Graylog AI-Powered Security on SecurityListing: AI-powered SIEM, API security, and log management platform

Catalyst SOAR
Security Orchestration Automation and Response
Catalyst SOAR on SecurityListing: Catalyst is a SOAR system that automates alert handling and incident response processes, adapting to your workflows and being open source.

CyberForce
Threat Intelligence Platforms
CyberForce|Q COSOC on SecurityListing: 24x7x365 Security Operations Center with threat detection and response services

Granef
Digital Forensics and Incident Response
Granef on SecurityListing: A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.

LeakIX
Offensive Security
LeakIX on SecurityListing: LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.

ERM Protect Digital
Digital Forensics and Incident Response
ERM Protect Digital Forensics on SecurityListing: Digital forensics services provided by ERM Protect

GroupSense Ransomware Readiness
Digital Risk Protection
GroupSense Ransomware Readiness on SecurityListing: Ransomware preparedness & response service with playbooks and negotiation

DBAppSecurity AiLog Big
Threat Intelligence Platforms
DBAppSecurity AiLog Big Data Log Management and Analysis Platform on SecurityListing: Big data log management platform for collection, parsing, storage & analysis

ARM Assembly and
Offensive Security
ARM Assembly and Shellcode on SecurityListing: A comprehensive collection of resources for learning ARM assembly language and shellcode development.

Netenrich Adaptive MDR
Threat Intelligence Platforms
Netenrich Adaptive MDR on SecurityListing: AI-powered MDR service with Google SecOps integration for threat detection

Huawei SecoManager Security
Security Orchestration Automation and Response
Huawei SecoManager Security Controller on SecurityListing: Security controller for policy mgmt, orchestration & log management

Amazon Detective
Digital Forensics and Incident Response
Amazon Detective on SecurityListing: A service that analyzes and visualizes security data to investigate potential security issues.

strings
Digital Forensics and Incident Response
strings on SecurityListing: A command-line utility for extracting human-readable text from binary files.

Proxmark 3
Offensive Security
Proxmark 3 on SecurityListing: The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.

Guardpot AI-Powered Cyber
Threat Intelligence Platforms
Guardpot AI-Powered Cyber Deception on SecurityListing: AI-powered deception platform using honeypots to detect & disrupt attacks

netsniff-ng toolkit
Digital Forensics and Incident Response
netsniff-ng toolkit on SecurityListing: netsniff-ng is a free Linux networking toolkit with zero-copy mechanisms for network development, analysis, and auditing.

checkra1n
Offensive Security
checkra1n on SecurityListing: Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

dc3dd
Digital Forensics and Incident Response
dc3dd on SecurityListing: dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.

THOR Lite
Digital Forensics and Incident Response
THOR Lite on SecurityListing: A free, fast, and flexible multi-platform IOC and YARA scanner for Windows, Linux, and macOS.

Google Search Operators:
Threat Hunting
Google Search Operators: The Complete List (44 Advanced Operators) on SecurityListing: A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.

Gradient Cyber Quorum™
Threat Intelligence Platforms
Gradient Cyber Quorum™ on SecurityListing: Unified threat detection platform for network, endpoint, cloud, and user telemetry

Charles Web Debugging
Digital Forensics and Incident Response
Charles Web Debugging Proxy on SecurityListing: An HTTP proxy, monitor, and reverse proxy tool for viewing HTTP and SSL/HTTPS traffic.

Huntress Managed Security
Endpoint Detection and Response
Huntress Managed Security Platform on SecurityListing: Managed security platform with EDR, ITDR, SIEM, and SAT backed by 24/7 SOC

Randomized Malleable C2
Penetration Testing
Randomized Malleable C2 Profiles Made Easy on SecurityListing: Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

Kojoney
Security Operations
Kojoney on SecurityListing: A honeypot for the SSH Service

Loading Alternate Data
Offensive Security
Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker on SecurityListing: Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.

Workbench
Digital Forensics and Incident Response
Workbench on SecurityListing: A scalable python framework for security research and development teams.

extundelete
Digital Forensics and Incident Response
extundelete on SecurityListing: A utility for recovering deleted files from ext3 or ext4 partitions.

LockBoxx
Offensive Security
LockBoxx on SecurityListing: Introduction to using GScript for Red Teams

Logz.io Infrastructure Monitoring
Security Information and Event Management
Logz.io Infrastructure Monitoring on SecurityListing: Prometheus-based infrastructure monitoring with unified logs, metrics, and traces

Mature SIEM Environment
Security Orchestration Automation and Response
Mature SIEM Environment for SOAR Implementation on SecurityListing: A mature SIEM environment is critical for successful SOAR implementation.

NETRESEC
Digital Forensics and Incident Response
NETRESEC on SecurityListing: Independent software vendor specializing in network security tools and network forensics.

FastIntercept
Security Orchestration Automation and Response
FastIntercept on SecurityListing: Fast Intercept is a security automation platform that empowers users to maximize their existing security products and automate routine tasks.

Foremost
Digital Forensics and Incident Response
Foremost on SecurityListing: A console program for file recovery through data carving.

Ekasha Incident Management
Security Orchestration Automation and Response
Ekasha Incident Management on SecurityListing: Incident management platform with automation, workflows, and playbooks

Intezer
Threat Hunting
Intezer on SecurityListing: Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

Bastille-Linux
Offensive Security
Bastille-Linux on SecurityListing: Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.

Simbian AI SOC
Security Orchestration Automation and Response
Simbian AI SOC Agent on SecurityListing: AI agent that autonomously investigates, triages, and responds to security alerts

Todyl Unified Platform
Managed Detection and Response
Todyl Unified Platform on SecurityListing: Unified cybersecurity platform for MSPs with SASE, EDR, SIEM, MXDR, and GRC

Stellar Cyber Multi-Layer
Threat Hunting
Stellar Cyber Multi-Layer AI™ on SecurityListing: AI-driven XDR platform with detection, correlation, investigation, and response

ServiceNow Security Operations
Threat Intelligence Platforms
ServiceNow Security Operations on SecurityListing: Platform for automating threat and vulnerability mgmt with incident response

Simbian AI Threat
Threat Hunting
Simbian AI Threat Hunt Agent on SecurityListing: AI agent that autonomously validates threat hunt hypotheses across enterprise data

Censys Threat Hunting
Threat Hunting
Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure

xenex xenexFoundation
API Security
xenex xenexFoundation on SecurityListing: Cloud-based Security Operations-as-a-Service with XDR engine and 700+ connectors

D3 Security Morpheus
Threat Hunting
D3 Security Morpheus AI on SecurityListing: AI-powered autonomous SOC platform for alert triage and investigation automation

Graylog SIEM
API Security
Graylog SIEM on SecurityListing: AI-powered SIEM platform for security operations, log management, and API security

Stackstorm
Security Orchestration Automation and Response
Stackstorm on SecurityListing: StackStorm is an open-source automation platform that connects and automates DevOps workflows and integrates with existing infrastructure.

Tracebit Dynamic Security
Cloud Security
Tracebit Dynamic Security Canaries on SecurityListing: Cloud-native deception platform deploying dynamic security canaries

Acronis Cyber Protect
Data Loss Prevention
Acronis Cyber Protect Cloud on SecurityListing: Cloud-based XDR platform for MSPs with AI-guided detection and response

Sophos Central
Multi-Factor Authentication and Single Sign-On
Sophos Central on SecurityListing: Cloud-based platform for unified mgmt of Sophos security solutions

tcpkill
Penetration Testing
tcpkill on SecurityListing: A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.

StrangeBee TheHive IaaS
Security Orchestration Automation and Response
StrangeBee TheHive IaaS Images on SecurityListing: Collaborative case management platform for incident response and investigation

The Security Ledger
Offensive Security
The Security Ledger on SecurityListing: Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.

SolarWinds Observability
Database Security
SolarWinds Observability on SecurityListing: Unified observability platform for IT infrastructure, apps, and databases

SIRP OmniSense™
Threat Intelligence Platforms
SIRP OmniSense™ on SecurityListing: AI-native autonomous SOC platform for threat detection and response

Trellix Wise Tour
Endpoint Detection and Response
Trellix Wise Tour on SecurityListing: Interactive product tours for Trellix security platform and products

Torq Hyperautomation
Threat Intelligence Platforms
Torq Hyperautomation on SecurityListing: Security hyperautomation platform for SOC workflow automation with AI agents

ThreatSpike Blue
Endpoint Detection and Response
ThreatSpike Blue on SecurityListing: Managed detection and response platform with EDR, email, network, and cloud security

Theos Managed Threat
Threat Hunting
Theos Managed Threat Detection & Response on SecurityListing: 24/7 managed threat detection and response service with SOC monitoring

TENEX Incident Response
Threat Hunting
TENEX Incident Response on SecurityListing: AI-driven MDR service with automated incident response and threat detection

Sumo Logic Cloud
Threat Hunting
Sumo Logic Cloud SIEM on SecurityListing: Cloud-native SIEM for real-time threat detection and investigation

WebDAV Covert Channel
Offensive Security
WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.

Stellar Cyber Multi-Layered
Extended Detection and Response
Stellar Cyber Multi-Layered AI Platform on SecurityListing: AI-driven Open XDR platform for MSSPs with multi-tenancy and automation

SimSpace Attack Catalog
Cyber Range Training
SimSpace Attack Catalog on SecurityListing: Catalog of simulated attack scenarios for cyber defense training and validation

Strengthen Your Phishing
Offensive Security
Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection on SecurityListing: A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions

Seceon aiSIEM
Security Information and Event Management
Seceon aiSIEM on SecurityListing: AI-powered SIEM with automated threat detection and response capabilities

SimSpace Cyber Range
Threat Intelligence Platforms
SimSpace Cyber Range Platform on SecurityListing: Cyber range platform for training, testing, and validating security controls.

StrangeBee TheHive
Security Orchestration Automation and Response
StrangeBee TheHive on SecurityListing: Security case management platform for SOCs, CERTs, and CSIRTs

7AI Platform
Threat Hunting
7AI Platform on SecurityListing: Autonomous AI agents for security alert investigation and response automation

Logpoint SIEM
Security Information and Event Management
Logpoint SIEM on SecurityListing: A security information and event management solution that collects, normalizes, and analyzes log data from across an organization's infrastructure to enhance threat detection and compliance reporting.

win10upgrade
Threat Intelligence Platforms
win10upgrade on SecurityListing: MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.

Exabeam Security Operations
Security Information and Event Management
Exabeam Security Operations Platform on SecurityListing: Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.

SCADA HoneyNet Project
Network Security
SCADA HoneyNet Project on SecurityListing: Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.

CSIS Managed Detection
Brand Protection
CSIS Managed Detection & Response on SecurityListing: MDR service with threat intel, digital risk protection, and incident response

The Sleuth Kit
Digital Forensics and Incident Response
The Sleuth Kit & Autopsy on SecurityListing: Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.

Axence ConnectPro
Digital Forensics and Incident Response
Axence ConnectPro on SecurityListing: Remote access and IT support tool for workstation management and diagnostics

Project Honey Pot
Security Operations
Project Honey Pot on SecurityListing: The Web's Largest Community Tracking Online Fraud & Abuse

Sumo Logic Logs
Security Information and Event Management
Sumo Logic Logs for Security on SecurityListing: Cloud-based log analytics platform for security monitoring and threat detection

Bleeping Computer
Offensive Security
Bleeping Computer on SecurityListing: A customizable offensive security reporting solution for pentesters and red teamers to generate detailed reports of their findings and vulnerabilities.

Using a SCF
Offensive Security
Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

OWASP Bricks
Penetration Testing
OWASP Bricks on SecurityListing: Deliberately vulnerable web application for security professionals to practice attack techniques.

Sumo Logic Application
Security Information and Event Management
Sumo Logic Application Modernization on SecurityListing: Cloud-based log analytics & monitoring platform for app modernization

Senseon Intelligence Cloud
Threat Hunting
Senseon Intelligence Cloud on SecurityListing: AI-driven SIEM alternative with managed SOC for threat detection and response

Rewterz XDR
Threat Intelligence Platforms
Rewterz XDR on SecurityListing: XDR platform for threat monitoring, detection, and response across environments

UPX
Offensive Security
UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.

Reverse Engineering HID
Offensive Security
Reverse Engineering HID iClass Master Keys on SecurityListing: Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.

Security Intelligence
Offensive Security
Security Intelligence on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

ClickOnce (Twice or
Penetration Testing
ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution on SecurityListing: A technique for social engineering and untrusted command execution using ClickOnce technology

DDE attack with
Offensive Security
DDE attack with PowerShell Empire on SecurityListing: Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.

Sigma Query
Threat Hunting
Sigma Query on SecurityListing: Searchable repository of Sigma detection rules for threat hunting and SIEM

Slavehack 2
Cyber Range Training
Slavehack 2 on SecurityListing: Online hacking game with realistic hacking experience and player interaction.

snmpcheck
Offensive Security
snmpcheck on SecurityListing: A tool for enumerating information via SNMP protocol.

AfterGlow
Threat Hunting
AfterGlow on SecurityListing: Visualize and analyze network relationships with AfterGlow

Lab of a
Offensive Security
Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory on SecurityListing: Abusing DNSAdmins privilege for escalation in Active Directory

Redline
Digital Forensics and Incident Response
Redline on SecurityListing: A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.

MaxxMDR MDR +
Threat Hunting
MaxxMDR MDR + NDR on SecurityListing: Managed detection & response with network detection & response capabilities

Windows 7 UAC
API Security
Windows 7 UAC Whitelist Code-Injection Issue on SecurityListing: Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

ThisisLegal.com
Cyber Range Training
ThisisLegal.com on SecurityListing: Hacker wargames site with forums and tutorials, fostering a learning community.

SecGame #1: Sauron
Penetration Testing
SecGame #1: Sauron on SecurityListing: A Linux-based environment for penetration testing and vulnerability exploitation

Troy Hunt
Offensive Security
Troy Hunt on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

Reveald ManagedDetection and
Threat Hunting
Reveald ManagedDetection and Response on SecurityListing: MDR service for CrowdStrike, Microsoft, and Trellix endpoints with 24/7 monitoring

Serving Random Payloads
Penetration Testing
Serving Random Payloads with Apache mod_rewrite on SecurityListing: A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

WayBackMachine
Digital Forensics and Incident Response
WayBackMachine on SecurityListing: A digital archive of the internet, allowing users to capture and browse archived web pages.

Performanta Safe XDR
Extended Detection and Response
Performanta Safe XDR on SecurityListing: XDR service for continuous threat exposure management and automated response

PAGO DeepACT
Threat Hunting
PAGO DeepACT on SecurityListing: MDR platform combining threat detection, hunting, and real-time containment

Company Chat Widget
Threat Hunting
Company Chat Widget on SecurityListing: Managed Detection and Response service provider

ResourcesExtract
Digital Forensics and Incident Response
ResourcesExtract on SecurityListing: Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files

PowerUpSQL
Penetration Testing
PowerUpSQL on SecurityListing: Tool for attacking Active Directory environments through SQL Server access.

Trust Direction: An
Offensive Security
Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

NetWitness Threat Detection
Endpoint Detection and Response
NetWitness Threat Detection & Response on SecurityListing: XDR platform combining NDR, EDR, SIEM, SOAR & UEBA for threat detection

Steghide
Digital Forensics and Incident Response
Steghide on SecurityListing: Steghide is a steganography program for hiding data in image and audio files.

Radiant Agentic AI
Threat Hunting
Radiant Agentic AI on SecurityListing: AI-powered SOC platform for automated alert triage, incident response & logging

Netenrich Resolution Intelligence
Threat Hunting
Netenrich Resolution Intelligence Cloud on SecurityListing: Cloud-native data analytics platform for security and digital ops management
Tracking a stolen
Digital Forensics and Incident Response
Tracking a stolen code-signing certificate with osquery on SecurityListing: Detect signed malware and track stolen code-signing certificates using osquery.

MFT Parsers Review
Digital Forensics and Incident Response
MFT Parsers Review on SecurityListing: Review of various MFT parsers used in digital forensics for analyzing NTFS file systems.

Wifislax
Penetration Testing
Wifislax on SecurityListing: GNU/Linux Wireless distribution for security testing with XFCE desktop environment.

WeChall
Cyber Range Training
WeChall on SecurityListing: A free online wargame for practicing hacking skills and learning security concepts.

Windows Oneliners for
Offensive Security
Windows Oneliners for Remote Code Execution on SecurityListing: Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

The DFIR Report
Threat Intelligence Platforms
The DFIR Report on SecurityListing: In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

AxoFlow AxoRouter
Data Classification
AxoFlow AxoRouter on SecurityListing: Security data pipeline platform for collection, routing, and processing

Tines Platform
Security Orchestration Automation and Response
Tines Platform on SecurityListing: Workflow automation platform for building and monitoring security workflows

X-Ways Forensics
Digital Forensics and Incident Response
X-Ways Forensics on SecurityListing: Advanced computer forensics software with efficient features.

XSS'OR
Offensive Security
XSS'OR on SecurityListing: Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.

ORNA Breach Response
Digital Forensics and Incident Response
ORNA Breach Response & Digital Forensics on SecurityListing: 24/7 breach response and digital forensics service for incident handling

Ranges – Cyber
Cyber Range Training
Ranges – Cyber Warfare Range LLC on SecurityListing: A network of physical and online cyber warfare ranges for training and testing

SOAR
Threat Hunting
SOAR on SecurityListing: A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.

syslog-ng Store Box
Security Information and Event Management
syslog-ng Store Box on SecurityListing: Enterprise log management appliance for collecting, indexing, and searching logs

Cribl Edge
Security Information and Event Management
Cribl Edge on SecurityListing: Vendor-neutral agent for unified telemetry collection across distributed infra

tcpreplay
Offensive Security
tcpreplay on SecurityListing: Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

RTIR
Digital Forensics and Incident Response
RTIR on SecurityListing: Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.

Preparing for Red
Penetration Testing
Preparing for Red Team at PRCCDC 2015 on SecurityListing: Preparation process for participating in the Pacific Rim CCDC 2015.

Leveraging INF-SCT Fetch
Offensive Security
Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2) on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

Timeline Explorer v0.4.0.0
Digital Forensics and Incident Response
Timeline Explorer v0.4.0.0 on SecurityListing: A powerful tool for analyzing and visualizing system activity timelines.

WinHex
Digital Forensics and Incident Response
WinHex on SecurityListing: Universal hexadecimal editor for computer forensics, data recovery, and IT security.

Blumira SOC Auto-Focus
Endpoint Detection and Response
Blumira SOC Auto-Focus on SecurityListing: XDR platform with AI-enhanced SIEM, automated response, and endpoint visibility

Webhacking.kr
Vulnerability Assessment
Webhacking.kr on SecurityListing: Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.

UTMStack Real-time SIEM
Extended Detection and Response
UTMStack Real-time SIEM & XDR on SecurityListing: Open source SIEM and XDR platform for real-time threat detection and response

Stellar Cyber AI-Based
Extended Detection and Response
Stellar Cyber AI-Based Open XDR on SecurityListing: AI-based Open XDR platform integrating NDR, AD, and FW for threat detection

Tines AI-driven SOC
Security Orchestration Automation and Response
Tines AI-driven SOC on SecurityListing: AI-driven workflow automation platform for SOC operations and security tasks

Cymph Security Playbooks
Security Orchestration Automation and Response
Cymph Security Playbooks on SecurityListing: A vendor-agnostic product for managing and analyzing cybersecurity playbooks.

Todyl Managed eXtended
Endpoint Detection and Response
Todyl Managed eXtended Detection & Response on SecurityListing: 24/7 managed XDR service with SOC, threat hunting, and dedicated analysts

Trellix Wise
Endpoint Detection and Response
Trellix Wise on SecurityListing: GenAI-powered security operations platform for automated alert investigation

SimSpace Cyber Range
Cyber Range Training
SimSpace Cyber Range on SecurityListing: Cyber range platform for training, testing, and validating security readiness

Torq HyperSOC
Security Orchestration Automation and Response
Torq HyperSOC on SecurityListing: AI-powered SOC platform for autonomous alert triage, investigation & response

Vshadow
Offensive Security
Vshadow on SecurityListing: A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.

VX-Underground
Threat Intelligence Platforms
VX-Underground on SecurityListing: VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

WebMax Tools Privacy
Digital Forensics and Incident Response
WebMax Tools Privacy Encoders / Decoders / Hash Generators on SecurityListing: Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.

Huntress Managed SIEM
Threat Hunting
Huntress Managed SIEM on SecurityListing: Managed SIEM with 24/7 AI-assisted SOC for threat detection and compliance

Sucuri Website Malware
Digital Forensics and Incident Response
Sucuri Website Malware Removal & Protection on SecurityListing: Website malware removal service with WAF, monitoring, and cleanup support

Workshop Hacking Bluetooth
Offensive Security
Workshop Hacking Bluetooth Smart locks on SecurityListing: A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.

Netsurion Managed Detection
Threat Hunting
Netsurion Managed Detection and Response on SecurityListing: MDR service with 24x7 SOC, XDR platform, and threat hunting capabilities

SolarWinds Incident Response
Digital Forensics and Incident Response
SolarWinds Incident Response on SecurityListing: Incident response platform for alert management, collaboration, and remediation

Simbian AI Security
Penetration Testing
Simbian AI Security Operations on SecurityListing: AI-powered security operations platform for autonomous alert triage & response

xxd
Digital Forensics and Incident Response
xxd on SecurityListing: A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.

Tracecat
Security Orchestration Automation and Response
Tracecat on SecurityListing: Open-source security automation platform for automating security alerts and building AI-assisted workflows.

Securonix Unified Defense
Threat Intelligence Platforms
Securonix Unified Defense SIEM on SecurityListing: Cloud-native SIEM platform with UEBA, SOAR, TIP, and TDIR capabilities

SECUINFRA Cyber Defense
Managed Detection and Response
SECUINFRA Cyber Defense on SecurityListing: German MDR & IR provider offering 24/7 threat detection and incident response

CrowdStrike Falcon Next-Gen
Threat Intelligence Platforms
CrowdStrike Falcon Next-Gen SIEM on SecurityListing: AI-native SIEM platform for consolidating security tools and data

Seceon aiXDR-PMAX
Data Loss Prevention
Seceon aiXDR-PMAX on SecurityListing: XDR platform with endpoint protection, detection, and automated response

Seceon OTM Platform
Extended Detection and Response
Seceon OTM Platform on SecurityListing: All-in-one platform combining SIEM, XDR, SOAR with AI/ML threat detection

Sekoia Cyber Threat
Threat Intelligence Platforms
Sekoia Cyber Threat Intelligence on SecurityListing: CTI platform providing structured threat intelligence and analysis

Seceon aiSIEM CGuard
Security Information and Event Management
Seceon aiSIEM CGuard 2.0 on SecurityListing: AI-powered SIEM for cloud security across Microsoft 365, Azure, AWS, and GCP

Reveald ManagedExtended Detection
Threat Hunting
Reveald ManagedExtended Detection and Response XDR on SecurityListing: Managed XDR service built on CrowdStrike Falcon LogScale platform

Theos Red Teaming
Offensive Security
Theos Red Teaming on SecurityListing: Red teaming service simulating real-world adversary attacks on organizations.

Gradient Cyber MXDR
Threat Hunting
Gradient Cyber MXDR on SecurityListing: Managed XDR service with 24/7 SOC for mid-market threat detection & response

WinDbg
Digital Forensics and Incident Response
WinDbg on SecurityListing: Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.

Talion Managed Detection
Threat Hunting
Talion Managed Detection & Response (MDR) on SecurityListing: 24/7 MDR service with threat hunting, containment, and SOC collaboration

Stellar Cyber Human-Augmented
Extended Detection and Response
Stellar Cyber Human-Augmented Autonomous SOC on SecurityListing: AI-native SecOps platform combining SIEM, XDR, NDR, ITDR, and UEBA capabilities

tcpxtract
Digital Forensics and Incident Response
tcpxtract on SecurityListing: A tool for extracting files from network traffic based on file signatures with support for various file formats and scalable search algorithm.

syslog-ng
Security Information and Event Management
syslog-ng on SecurityListing: A log management solution that optimizes SIEM performance, provides rapid search and troubleshooting, and meets compliance requirements.

syslog-ng Premium Edition
Database Security
syslog-ng Premium Edition on SecurityListing: Enterprise log management software for collecting and centralizing log data

syslog-ng Open Source
Security Information and Event Management
syslog-ng Open Source Edition on SecurityListing: Open-source log collection, processing, and forwarding tool for log management

Trellix Security Platform
Threat Intelligence Platforms
Trellix Security Platform on SecurityListing: AI-powered security platform for detection, response, and threat protection

Sumo Logic Dojo
Security Information and Event Management
Sumo Logic Dojo AI on SecurityListing: Cloud SIEM platform with AI-powered security analytics and automation

Sumo Logic Monitoring
Security Information and Event Management
Sumo Logic Monitoring and Troubleshooting on SecurityListing: Log analytics platform for monitoring, troubleshooting, and issue detection

tcpick
Digital Forensics and Incident Response
tcpick on SecurityListing: A textmode sniffer for tracking tcp streams and capturing data in various modes.

ORNA End-to-End AI
Threat Intelligence Platforms
ORNA End-to-End AI Cyber Incident Response Platform on SecurityListing: AI-powered cyber incident response platform for training, orchestration & mgmt

testdisk
Digital Forensics and Incident Response
testdisk on SecurityListing: TestDisk is a free data recovery software that can recover lost partitions and undelete files from various file systems.

WindowsSCOPE
Digital Forensics and Incident Response
WindowsSCOPE on SecurityListing: A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.

StrangeBee TheHive Cloud
Security Orchestration Automation and Response
StrangeBee TheHive Cloud Platform on SecurityListing: SaaS security case management platform for incident response teams

Tao Security
Offensive Security
Tao Security on SecurityListing: Sysreptor provides a customizable reporting platform for pentesters and red teamers to efficiently document security assessments.