search
Join or Log In

Security Operations

Browse 379 cybersecurity tools tagged with "Security Operations"

Damn Vulnerable iOS App (DVIA)

Damn Vulnerable iOS

language

Penetration Testing

Damn Vulnerable iOS App (DVIA) on SecurityListing: iOS application for testing iOS penetration testing skills in a legal environment.

4.8(3)
CBRX

CBRX

language

Digital Forensics and Incident Response

CBRX on SecurityListing: CBRX is a cloud-based platform that automates incident analysis and reporting for cybersecurity teams.

4.8(3)
Monkey-Spider

Monkey-Spider

language

Security Operations

Monkey-Spider on SecurityListing: A crawler-based low-interaction client honeypot for exposing website threats.

4.8(3)
ProLion CryptoSpike

ProLion CryptoSpike

language

Extended Detection and Response

ProLion CryptoSpike on SecurityListing: Real-time ransomware detection & blocking for storage systems with recovery

4.8(3)
Reverse Engineering Challenges

Reverse Engineering Challenges

language

Cyber Range Training

Reverse Engineering Challenges on SecurityListing: A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.

4.8(3)
Logsign Unified SO Platform

Logsign Unified SO

language

Threat Hunting

Logsign Unified SO Platform on SecurityListing: SOAR platform automating threat detection, incident response, and workflows

4.8(3)
xargs

xargs

language

Offensive Security

xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

4.7(2)
Attack-Defense Online Lab

Attack-Defense Online Lab

language

Vulnerability Assessment

Attack-Defense Online Lab on SecurityListing: Hands-on cybersecurity training and testing platform with 1800+ labs

4.7(2)
Metadefender Cloud

Metadefender Cloud

language

Digital Forensics and Incident Response

Metadefender Cloud on SecurityListing: Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.

4.7(2)
DorkSearch

DorkSearch

language

Offensive Security

DorkSearch on SecurityListing: An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.

4.7(2)
Cipher xMDR

Cipher xMDR

language

Threat Hunting

Cipher xMDR on SecurityListing: AI-driven MDR service providing unified threat detection across IT, OT, cloud

4.7(2)
Art of Memory Forensics

Art of Memory

language

Digital Forensics and Incident Response

Art of Memory Forensics on SecurityListing: A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.

4.7(2)
DuskRise Security Dashboard

DuskRise Security Dashboard

language

Security Information and Event Management

DuskRise Security Dashboard on SecurityListing: Security dashboard for remote network visibility and policy enforcement

4.7(2)
Mandiant Threat Defense

Mandiant Threat Defense

language

Threat Hunting

Mandiant Threat Defense on SecurityListing: Managed threat detection, hunting, and response service by Mandiant experts

4.7(2)
Anvilogic

Anvilogic

language

Security Information and Event Management

Anvilogic on SecurityListing: Anvilogic is a SIEM platform that streamlines detection engineering, offers cost-effective data management, and enhances threat detection capabilities.

4.7(2)
Intrusion Detection Honeypots

Intrusion Detection Honeypots

language

Network Security

Intrusion Detection Honeypots on SecurityListing: A foundational guide for using deception against computer network adversaries using honeypots to detect adversaries before they accomplish their goals.

4.7(2)
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

Cobalt Strike HTTP

language

Offensive Security

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

4.7(2)
AccessData FTK Imager

AccessData FTK Imager

language

Digital Forensics and Incident Response

AccessData FTK Imager on SecurityListing: A digital forensic tool for creating forensic images of computer hard drives and analyzing digital evidence.

4.7(2)
exif

exif

language

Digital Forensics and Incident Response

exif on SecurityListing: A command-line utility to show and change EXIF information in JPEG files

4.7(2)
LogCraft Detection Engineering

LogCraft Detection Engineering

language

Endpoint Detection and Response

LogCraft Detection Engineering on SecurityListing: Detection-as-code platform for managing detection rules across SIEM/EDR/XDR

4.7(2)
D3 Morpheus AI SOC

D3 Morpheus AI

language

Threat Intelligence Platforms

D3 Morpheus AI SOC on SecurityListing: AI-driven SOC platform for automated alert triage, investigation, and response

4.7(2)
ESET Protect MDR Ultimate

ESET Protect MDR

language

Threat Hunting

ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.

4.7(2)
PEview

PEview

language

Digital Forensics and Incident Response

PEview on SecurityListing: A PE/COFF file viewer that displays header, section, directory, import table, export table, and resource information within various file types.

4.7(2)
PentesterLab PRO

PentesterLab PRO

language

Penetration Testing

PentesterLab PRO on SecurityListing: Online platform offering 700+ hands-on web security exercises and training

4.7(2)
Honeyd Tools

Honeyd Tools

language

Security Operations

Honeyd Tools on SecurityListing: A collection of tools that can be used with Honeyd for data analysis or other purposes

4.7(2)
LAMPSecurity Training

LAMPSecurity Training

language

Penetration Testing

LAMPSecurity Training on SecurityListing: A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.

4.7(2)
Nomoreransom

Nomoreransom

language

Digital Forensics and Incident Response

Nomoreransom on SecurityListing: No More Ransom is a collaborative project to combat ransomware attacks by providing decryption tools and prevention advice.

4.7(2)
Kali

Kali

language

Vulnerability Assessment

Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

4.7(2)
Lumifi ShieldVision™

Lumifi ShieldVision™

language

Endpoint Detection and Response

Lumifi ShieldVision™ on SecurityListing: SOAR platform with investigation, automation, and incident mgmt capabilities

4.7(2)
Brute Ratel C4

Brute Ratel C4

language

Offensive Security

Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

4.7(2)
Dropzone AI

Dropzone AI

language

Security Orchestration Automation and Response

Dropzone AI on SecurityListing: Dropzone AI is an autonomous AI agent for SOCs that performs end-to-end investigations of security alerts, integrating with existing cybersecurity tools and data sources.

4.7(2)
Lab of a Penetration Tester: Week of Evading Microsoft ATA

Lab of a

language

Offensive Security

Lab of a Penetration Tester: Week of Evading Microsoft ATA on SecurityListing: A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection

4.5(3)
Event Log Explorer

Event Log Explorer

language

Security Information and Event Management

Event Log Explorer on SecurityListing: Event Log Explorer is a software solution for viewing, analyzing, and monitoring events recorded in Microsoft Windows event logs, offering advanced features and efficient filtering capabilities.

4.5(3)
Combatting Incident Responders with Apache mod_rewrite

Combatting Incident Responders

language

Offensive Security

Combatting Incident Responders with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.

4.5(3)
Capsicum

Capsicum

language

Container Security

Capsicum on SecurityListing: A security framework for process isolation and sandboxing based on capability-based security principles.

4.5(3)
ParrotSec

ParrotSec

language

Offensive Security

ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

4.5(3)
Logz.io Distributed Tracing

Logz.io Distributed Tracing

language

Security Information and Event Management

Logz.io Distributed Tracing on SecurityListing: Distributed tracing platform for monitoring microservices performance

4.5(3)
Zenduty

Zenduty

language

Security Orchestration Automation and Response

Zenduty on SecurityListing: Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.

4.5(3)
BeEF

BeEF

language

Penetration Testing

BeEF on SecurityListing: BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.

4.5(3)
Logpoint SecOps Platform

Logpoint SecOps Platform

language

Security Information and Event Management

Logpoint SecOps Platform on SecurityListing: Integrated SIEM, SOAR, NDR platform with central fleet management capabilities

4.5(3)
PoshC2

PoshC2

language

Penetration Testing

PoshC2 on SecurityListing: A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

4.5(3)
ORDR IQ

ORDR IQ

language

Security Orchestration Automation and Response

ORDR IQ on SecurityListing: Multi-agent AI orchestrator for IT and security workflow automation

4.5(3)
Blockbit XDR

Blockbit XDR

language

Threat Intelligence Platforms

Blockbit XDR on SecurityListing: XDR platform providing detection and response across endpoints, networks, and email

4.5(3)
CyberCPR

CyberCPR

language

Digital Forensics and Incident Response

CyberCPR on SecurityListing: Incident response and case management solution for efficient incident response and management.

4.5(1)
RAD Security RAD FusionAI Core

RAD Security RAD

language

Security Orchestration Automation and Response

RAD Security RAD FusionAI Core on SecurityListing: AI-powered security platform that correlates signals & automates actions

4.5(1)
Covert Red Team Attack Infrastructure

Covert Red Team

language

Offensive Security

Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.

4.5(1)
Contagio Mobile

Contagio Mobile

language

Digital Forensics and Incident Response

Contagio Mobile on SecurityListing: A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

4.5(1)
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

Abusing the COM

language

Offensive Security

Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 on SecurityListing: Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

4.5(1)
Binalyze AIR

Binalyze AIR

language

Digital Forensics and Incident Response

Binalyze AIR on SecurityListing: Modern digital forensics and incident response platform with comprehensive tools.

4.5(1)
Belkasoft X Forensic

Belkasoft X Forensic

language

Digital Forensics and Incident Response

Belkasoft X Forensic on SecurityListing: A reliable end-to-end DFIR solution for boosting cyber incident response and forensics capacity.

4.5(1)
detections.ai Detections

detections.ai Detections

language

Threat Intelligence Platforms

detections.ai Detections on SecurityListing: Community platform for sharing and creating detection rules with AI

4.5(1)
CrowdStrike Community Tools

CrowdStrike Community Tools

language

Digital Forensics and Incident Response

CrowdStrike Community Tools on SecurityListing: Free tools for the CrowdStrike customer community to support their use of the Falcon platform.

4.5(1)
Purple Academy by Picus

Purple Academy by

language

Cyber Range Training

Purple Academy by Picus on SecurityListing: Platform offering cybersecurity courses for Red, Blue, and Purple Teamers by Picus.

4.5(1)
Intelligence-Driven Incident Response

Intelligence-Driven Incident Response

language

Digital Forensics and Incident Response

Intelligence-Driven Incident Response on SecurityListing: ENISA Training Resources offers online training material for cybersecurity specialists, covering technical areas such as artefact handling and analysis.

4.5(1)
Abusing DCOM For Yet Another Lateral Movement Technique

Abusing DCOM For

language

Offensive Security

Abusing DCOM For Yet Another Lateral Movement Technique on SecurityListing: An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.

4.5(1)
Practical Memory Forensics

Practical Memory Forensics

language

Digital Forensics and Incident Response

Practical Memory Forensics on SecurityListing: A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.

4.5(1)
Enterprise Detection & Response: A Simple Hunting Maturity Model

Enterprise Detection &

language

Threat Hunting

Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response

4.5(1)
State of Security

State of Security

language

Offensive Security

State of Security on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

4.5(1)
HoneyDrive

HoneyDrive

language

Security Operations

HoneyDrive on SecurityListing: HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

4.5(1)
BitLyft True MDR

BitLyft True MDR

language

Threat Hunting

BitLyft True MDR on SecurityListing: 24/7 managed detection and response service with US-based SOC analysts

4.5(1)
Hunters Next-Gen SIEM

Hunters Next-Gen SIEM

language

Threat Hunting

Hunters Next-Gen SIEM on SecurityListing: Next-gen SIEM with AI-powered triage, automated investigation & detection

4.5(1)
0xf.at Hackits

0xf.at Hackits

language

Cyber Range Training

0xf.at Hackits on SecurityListing: Solve password-riddles on a website without logins or ads.

4.5(1)
Prophet Security Prophet AI SOC Analyst

Prophet Security Prophet

language

Security Orchestration Automation and Response

Prophet Security Prophet AI SOC Analyst on SecurityListing: AI-powered SOC analyst that automates alert triage and investigation

4.5(1)
BitLyft AIR®

BitLyft AIR®

language

Security Orchestration Automation and Response

BitLyft AIR® on SecurityListing: Automated incident response platform for Microsoft 365 and identity systems

4.5(1)
GNU Netcat

GNU Netcat

language

Offensive Security

GNU Netcat on SecurityListing: A featured networking utility for reading and writing data across network connections with advanced capabilities.

4.5(1)
Prophet Security Prophet AI Threat Hunter

Prophet Security Prophet

language

Threat Hunting

Prophet Security Prophet AI Threat Hunter on SecurityListing: AI-driven threat hunting platform for SOC alert triage and investigation

4.5(1)
IonX Verisys FIM

IonX Verisys FIM

language

Security Information and Event Management

IonX Verisys FIM on SecurityListing: File integrity monitoring for Windows, Linux & network devices

4.5(1)
Quorum Cyber Emergency MDR

Quorum Cyber Emergency

language

Threat Hunting

Quorum Cyber Emergency MDR on SecurityListing: Emergency MDR service for orgs experiencing active cyber incidents or attacks

4.5(1)
IO Wargame

IO Wargame

language

Cyber Range Training

IO Wargame on SecurityListing: Frontpage of the IO wargame with various versions and connection details.

4.5(1)
Perisai Agentic-AI Hyperautomation

Perisai Agentic-AI Hyperautomation

language

Endpoint Detection and Response

Perisai Agentic-AI Hyperautomation on SecurityListing: AI-driven SOAR platform for automated incident response & threat detection

4.5(1)
Hunters Pathfinder AI

Hunters Pathfinder AI

language

Threat Hunting

Hunters Pathfinder AI on SecurityListing: AI-driven SOC platform with autonomous threat detection, investigation & response

4.5(1)
Graylog AI-Powered Security & IT Operations

Graylog AI-Powered Security

language

API Security

Graylog AI-Powered Security & IT Operations on SecurityListing: AI-powered SIEM, API security, and log management platform

4.5(1)
DNS Tunnelling

DNS Tunnelling

language

Offensive Security

DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.

4.5(1)
Logsign USO Platform

Logsign USO Platform

language

Security Information and Event Management

Logsign USO Platform on SecurityListing: SIEM platform with compliance reporting for regulatory standards

4.5(1)
NetWitness Cybersecurity

NetWitness Cybersecurity

language

Endpoint Detection and Response

NetWitness Cybersecurity on SecurityListing: Integrated XDR platform combining NDR, SIEM, EDR, and SOAR capabilities

4.5(1)
HoneyView

HoneyView

language

Security Operations

HoneyView on SecurityListing: HoneyView is a tool for analyzing honeyd logfiles graphically and textually.

4.5(1)
OODA-driven SOC Strategy

OODA-driven SOC Strategy

language

Endpoint Detection and Response

OODA-driven SOC Strategy on SecurityListing: Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.

4.5(1)
Agentic AI AR2™

Agentic AI AR2™

language

Threat Intelligence Platforms

Agentic AI AR2™ on SecurityListing: Autonomous AI SOC platform for automated threat response and remediation

4.5(1)
Bait and Switch Honeypot

Bait and Switch

language

Security Operations

Bait and Switch Honeypot on SecurityListing: An active and aggressive honeypot tool for network security.

4.5(1)
Bifrozt

Bifrozt

language

Security Operations

Bifrozt on SecurityListing: High interaction honeypot solution for Linux systems with data control and integrity features.

4.5(1)
cabextract

cabextract

language

Digital Forensics and Incident Response

cabextract on SecurityListing: Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.

4.5(1)
Userland API Monitoring and Code Injection Detection

Userland API Monitoring

language

Digital Forensics and Incident Response

Userland API Monitoring and Code Injection Detection on SecurityListing: Explores malware interaction with Windows API and methods for detection and prevention.

4.5(1)
Coro Cybersecurity

Coro Cybersecurity

language

Security Awareness Training

Coro Cybersecurity on SecurityListing: Unified cybersecurity platform with modular security controls and AI engine

4.5(1)
Daylight Threat Detection and Response

Daylight Threat Detection

language

Threat Hunting

Daylight Threat Detection and Response on SecurityListing: AI-powered MDR combining agentic AI with human expertise for threat detection

4.5(1)
LastActivityView

LastActivityView

language

Digital Forensics and Incident Response

LastActivityView on SecurityListing: A tool that collects and displays user activity and system events on a Windows system.

4.5(1)
Gravwell Security Data Platform

Gravwell Security Data

language

Threat Hunting

Gravwell Security Data Platform on SecurityListing: Security data platform for log analysis, metrics, and threat hunting

4.5(1)
Dynatrace

Dynatrace

language

Security Information and Event Management

Dynatrace on SecurityListing: Unified observability and security platform with AI-powered analytics

4.5(1)
Reversing and Exploiting ARM Binaries: rwthCTF Trafman

Reversing and Exploiting

language

Offensive Security

Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

4.5(1)
NSFOCUS Intelligent Security Operations Platform

NSFOCUS Intelligent Security

language

Threat Hunting

NSFOCUS Intelligent Security Operations Platform on SecurityListing: XDR platform with SOAR capabilities for security operations centers

4.5(1)
Fraud.com fcase Fraud Orchestration

Fraud.com fcase Fraud

language

API Security

Fraud.com fcase Fraud Orchestration on SecurityListing: Fraud orchestration platform for financial institutions

4.5(1)
Threat.Zone

Threat.Zone

language

Digital Forensics and Incident Response

Threat.Zone on SecurityListing: Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

4.5(1)
Cydarm Platform

Cydarm Platform

language

Security Orchestration Automation and Response

Cydarm Platform on SecurityListing: SOC management platform for incident response and cyber response management

4.5(1)
HoneyDB

HoneyDB

language

Threat Hunting

HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

4.5(1)
Cobalt Strike's ExternalC2 framework

Cobalt Strike's ExternalC2

language

Penetration Testing

Cobalt Strike's ExternalC2 framework on SecurityListing: A specification/framework for extending default C2 communication channels in Cobalt Strike

4.5(1)
Logpoint Director

Logpoint Director

language

Security Information and Event Management

Logpoint Director on SecurityListing: A centralized management console for efficiently operating and monitoring large-scale, multitenant Logpoint SIEM deployments across customers, geographies, and organizational divisions.

4.5(1)
Positive Hack Days Fest

Positive Hack Days

language

Cyber Range Training

Positive Hack Days Fest on SecurityListing: International cybersecurity festival for all, who wants to dive into the world of cyber security and have a great time.

4.5(1)
Threatpost

Threatpost

language

Offensive Security

Threatpost on SecurityListing: Sysreptor offers a customizable reporting solution for penetration testing and red teaming.

4.5(1)
Aircrack-ng

Aircrack-ng

language

Offensive Security

Aircrack-ng on SecurityListing: A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.

4.5(1)
StrangeBee Cortex

StrangeBee Cortex

language

Security Orchestration Automation and Response

StrangeBee Cortex on SecurityListing: Open-source observable analysis engine and companion tool for TheHive platform

4.5(1)
Quorum Cyber Clarity

Quorum Cyber Clarity

language

Data Loss Prevention

Quorum Cyber Clarity on SecurityListing: Managed security services platform offering MDR, threat detection, and DLP

4.5(1)
Zeronsec Anrita

Zeronsec Anrita

language

Threat Hunting

Zeronsec Anrita on SecurityListing: Real-time threat detection and monitoring platform with SIEM capabilities

4.5(1)
Belkasoft Evidence Center

Belkasoft Evidence Center

language

Digital Forensics and Incident Response

Belkasoft Evidence Center on SecurityListing: Comprehensive digital forensics and incident response platform for law enforcement, corporate, and academic institutions.

4.5(1)
GHH - Google Hack Honeypot

GHH - Google

language

Security Operations

GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

4.5(1)
FEX Imager™

FEX Imager™

language

Digital Forensics and Incident Response

FEX Imager™ on SecurityListing: Forensic imaging program with full hash authentication and various acquisition options.

4.5(1)
Attic MDR

Attic MDR

language

Threat Hunting

Attic MDR on SecurityListing: 24/7 managed detection and response service for Microsoft 365 environments

4.5(1)
Fabric Platform by BlackStork

Fabric Platform by

language

Security Information and Event Management

Fabric Platform by BlackStork on SecurityListing: Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.

4.5(1)
ExoneraTor

ExoneraTor

language

Digital Forensics and Incident Response

ExoneraTor on SecurityListing: Check if an IP address was used as a Tor relay on a given date.

4.5(1)
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts

Executing Commands and

language

Offensive Security

Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts on SecurityListing: A blog post about bypassing AppLocker using PowerShell diagnostic scripts

4.5(1)
KFSensor

KFSensor

language

Penetration Testing

KFSensor on SecurityListing: KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.

4.5(1)
Coralogix DataPrime Engine

Coralogix DataPrime Engine

language

Security Information and Event Management

Coralogix DataPrime Engine on SecurityListing: Observability platform with unified query engine for logs, metrics, and traces

4.5(1)
DEF CON CTF Archive

DEF CON CTF

language

Container Security

DEF CON CTF Archive on SecurityListing: A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.

4.5(1)
MFTECmd

MFTECmd

language

Digital Forensics and Incident Response

MFTECmd on SecurityListing: A command-line tool for managing and analyzing Microsoft Forefront TMG and UAG configurations.

4.5(1)
DVWA - Brute Force (High Level) - Anti-CSRF Tokens

DVWA - Brute

language

Offensive Security

DVWA - Brute Force (High Level) - Anti-CSRF Tokens on SecurityListing: A guide to brute forcing DVWA on the high security level with anti-CSRF tokens

4.5(1)
Grafana Cloud Logs

Grafana Cloud Logs

language

Security Information and Event Management

Grafana Cloud Logs on SecurityListing: Managed log aggregation system for storing and querying application logs

4.5(1)
How to Write Malleable C2 Profiles for Cobalt Strike

How to Write

language

Offensive Security

How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

4.5(1)
PhotoRec

PhotoRec

language

Digital Forensics and Incident Response

PhotoRec on SecurityListing: A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.

4.5(1)
Daniel Miessler/Unsupervised Learning

Daniel Miessler/Unsupervised Learning

language

Offensive Security

Daniel Miessler/Unsupervised Learning on SecurityListing: Sysreptor offers a customizable reporting solution for offensive security assessments.

4.5(1)
PAGO Networks PAGO MDR

PAGO Networks PAGO

language

Endpoint Detection and Response

PAGO Networks PAGO MDR on SecurityListing: MDR service with real-time monitoring and threat response capabilities

4.5(1)
hackxor

hackxor

language

Cyber Range Training

hackxor on SecurityListing: A platform offering hacking missions to test and enhance skills.

4.5(1)
Panaseer Metrics Measurement

Panaseer Metrics Measurement

language

Risk Assessment

Panaseer Metrics Measurement on SecurityListing: Automates security metrics measurement and reporting for posture management.

4.5(1)
Huntbase Platform

Huntbase Platform

language

Threat Hunting

Huntbase Platform on SecurityListing: Platform for threat investigation with automation and knowledge management

4.5(1)
Fidelis Security

Fidelis Security

language

Endpoint Detection and Response

Fidelis Security on SecurityListing: XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities

4.5(1)
With Secure Elements Platform

With Secure Elements

language

Exposure Management

With Secure Elements Platform on SecurityListing: WithSecure Elements Cloud is a modular cybersecurity platform that combines AI-powered software and expert services to provide comprehensive protection across endpoints, identities, and cloud environments.

4.5(1)
Verisys File Integirty Monitoring

Verisys File Integirty

language

Security Information and Event Management

Verisys File Integirty Monitoring on SecurityListing: A next-generation file integrity monitoring and change detection system

4.5(1)
Logsign Unified Security Operations Platform

Logsign Unified Security

language

Threat Intelligence Platforms

Logsign Unified Security Operations Platform on SecurityListing: Unified security operations platform combining SIEM, TI, UEBA, and TDIR

4.5(1)
Ophcrack

Ophcrack

language

Offensive Security

Ophcrack on SecurityListing: Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.

4.5(1)
LogRythm SIEM

LogRythm SIEM

language

Security Information and Event Management

LogRythm SIEM on SecurityListing: LogRhythm SIEM is a comprehensive security information and event management platform that collects, analyzes, and responds to security events across an organization's IT infrastructure.

4.5(1)
Graylog

Graylog

language

Security Information and Event Management

Graylog on SecurityListing: Graylog offers advanced log management and SIEM capabilities to enhance security and compliance across various industries.

4.5(1)
Grep App

Grep App

language

Threat Hunting

Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

4.5(1)
Logz.io Log Management

Logz.io Log Management

language

Security Information and Event Management

Logz.io Log Management on SecurityListing: Cloud-based log management platform with AI-driven analysis and observability

4.5(1)
TechTarget

TechTarget

language

Offensive Security

TechTarget on SecurityListing: Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.

4.5(1)
DFIR CTF: Precision Widgets of North Dakota Intrusion

DFIR CTF: Precision

language

Cyber Range Training

DFIR CTF: Precision Widgets of North Dakota Intrusion on SecurityListing: A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.

4.5(1)
Mandiant Managed Defense

Mandiant Managed Defense

language

Threat Hunting

Mandiant Managed Defense on SecurityListing: 24/7 managed threat detection, investigation, and response service

4.5(1)
CrowdStrike Falcon Onum

CrowdStrike Falcon Onum

language

Security Information and Event Management

CrowdStrike Falcon Onum on SecurityListing: Data pipeline mgmt for SOC transformation with real-time data processing

4.5(1)
Devo Security Data Platform

Devo Security Data

language

Threat Hunting

Devo Security Data Platform on SecurityListing: Security data platform combining SIEM, SOAR, UEBA, and threat hunting

4.5(1)
DiskShadow

DiskShadow

language

Offensive Security

DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

4.5(1)
Impost

Impost

language

Network Security

Impost on SecurityListing: Impost is a powerful network security auditing tool with honey pot and packet sniffer capabilities.

4.5(1)
H3C U-Center Unified O&M Cloud

H3C U-Center Unified

language

Security Information and Event Management

H3C U-Center Unified O&M Cloud on SecurityListing: Unified O&M cloud platform for network and IT infrastructure management

4.5(1)
Hybrid-Analysis

Hybrid-Analysis

language

Threat Intelligence Platforms

Hybrid-Analysis on SecurityListing: Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.

4.5(1)
Shuffler

Shuffler

language

Security Orchestration Automation and Response

Shuffler on SecurityListing: Shuffle Automation provides an open-source platform for security orchestration, automation, and response.

4.5(1)
Logpoint SOAR & Automation

Logpoint SOAR &

language

Security Orchestration Automation and Response

Logpoint SOAR & Automation on SecurityListing: SOAR platform for automated alert triage, investigation, and response

4.5(1)
Crowdstrike Charlotte AI

Crowdstrike Charlotte AI

language

Extended Detection and Response

Crowdstrike Charlotte AI on SecurityListing: GenAI assistant that provides faster intelligence for security operations

4.5(1)
Explorer Suite

Explorer Suite

language

Digital Forensics and Incident Response

Explorer Suite on SecurityListing: A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

4.5(1)
ExploitDB

ExploitDB

language

Penetration Testing

ExploitDB on SecurityListing: A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

4.5(1)
Valkyrie Comodo

Valkyrie Comodo

language

Digital Forensics and Incident Response

Valkyrie Comodo on SecurityListing: Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.

4.5(1)
GNU Binutils

GNU Binutils

language

Digital Forensics and Incident Response

GNU Binutils on SecurityListing: A collection of binary tools for various purposes including linking, assembling, profiling, and more.

4.5(1)
Itential Orchestration

Itential Orchestration

language

API Security

Itential Orchestration on SecurityListing: AI-powered orchestration platform for network & infrastructure automation

4.5(1)
Detecting Lateral Movement through Tracking Event Logs (Version 2)

Detecting Lateral Movement

language

Digital Forensics and Incident Response

Detecting Lateral Movement through Tracking Event Logs (Version 2) on SecurityListing: A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.

4.5(1)
Lumifi Managed Detection & Response

Lumifi Managed Detection

language

Endpoint Detection and Response

Lumifi Managed Detection & Response on SecurityListing: 24/7 MDR service with automated threat hunting and response capabilities

4.5(1)
Proxmark III

Proxmark III

language

Offensive Security

Proxmark III on SecurityListing: A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

4.5(1)
Lumifi Network Detection & Response (NDR)

Lumifi Network Detection

language

Managed Detection and Response

Lumifi Network Detection & Response (NDR) on SecurityListing: Managed NDR service monitoring network traffic for threats via co-managed model

4.5(1)
Alien Vault Ossim

Alien Vault Ossim

language

Vulnerability Assessment

Alien Vault Ossim on SecurityListing: AlienVault OSSIM provides an all-in-one security management solution with asset discovery, vulnerability assessment, and SIEM capabilities.

4.5(1)
Harness AI for DevOps

Harness AI for

language

Security Orchestration Automation and Response

Harness AI for DevOps on SecurityListing: AI-powered DevOps platform for CI/CD, testing, security, and cost mgmt.

4.5(1)
Magnet ACQUIRE

Magnet ACQUIRE

language

Digital Forensics and Incident Response

Magnet ACQUIRE on SecurityListing: Magnet ACQUIRE offers robust data extraction capabilities for digital forensics investigations, supporting a wide range of devices.

4.5(1)
LaBrea

LaBrea

language

Penetration Testing

LaBrea on SecurityListing: LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.

4.5(1)
Jupyter Notebooks for Threat Hunting

Jupyter Notebooks for

language

Threat Hunting

Jupyter Notebooks for Threat Hunting on SecurityListing: Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.

4.5(1)
Highlighter

Highlighter

language

Threat Hunting

Highlighter on SecurityListing: Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.

4.5(1)
Heimdal Unified Cybersecurity Platform

Heimdal Unified Cybersecurity

language

Endpoint Detection and Response

Heimdal Unified Cybersecurity Platform on SecurityListing: Unified cybersecurity platform with XDR, EDR, PAM, email security, and compliance

4.5(1)
HIHAT - High Interaction Honeypot Analysis Toolkit

HIHAT - High

language

Threat Intelligence Platforms

HIHAT - High Interaction Honeypot Analysis Toolkit on SecurityListing: A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.

4.5(1)
Prophet Security Prophet AI

Prophet Security Prophet

language

Security Orchestration Automation and Response

Prophet Security Prophet AI on SecurityListing: AI-driven SOC platform for automated alert triage, investigation & response

4.3(2)
Forensic Registry EDitor (FRED)

Forensic Registry EDitor

language

Digital Forensics and Incident Response

Forensic Registry EDitor (FRED) on SecurityListing: A cross-platform registry hive editor for forensic analysis with advanced features like hex viewer and reporting engine.

4.3(2)
dfir.org

dfir.org

language

Digital Forensics and Incident Response

dfir.org on SecurityListing: Andrew Case's personal page for research, software projects, and speaking events

4.3(2)
PTJunior

PTJunior

language

Offensive Security

PTJunior on SecurityListing: AI agent that autonomously discovers, exploits, and documents vulnerabilities.

4.3(2)
Empire Communication Profiles

Empire Communication Profiles

language

Offensive Security

Empire Communication Profiles on SecurityListing: Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.

4.3(2)
Metasploit Unleashed

Metasploit Unleashed

language

Penetration Testing

Metasploit Unleashed on SecurityListing: Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

4.3(2)
Caldera

Caldera

language

Offensive Security

Caldera on SecurityListing: Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

4.3(2)
Logsign SAP Security

Logsign SAP Security

language

Security Information and Event Management

Logsign SAP Security on SecurityListing: SIEM platform for SAP security monitoring and threat detection

4.3(2)
Netdude

Netdude

language

Digital Forensics and Incident Response

Netdude on SecurityListing: Network Dump data Displayer and Editor framework for tcpdump trace files manipulation.

4.3(2)
Graylog Graylog

Graylog Graylog

language

API Security

Graylog Graylog on SecurityListing: AI-powered SIEM, API security, and log management platform

4.3(2)
Log Parser Lizard

Log Parser Lizard

language

Security Information and Event Management

Log Parser Lizard on SecurityListing: A dynamic GUI for advanced log analysis, allowing users to execute SQL queries on structured log data.

4.3(2)
Axoflow Platform

Axoflow Platform

language

Security Information and Event Management

Axoflow Platform on SecurityListing: Security data pipeline platform for collecting, curating, and routing logs

4.3(2)
D3 Security Smart SOAR

D3 Security Smart

language

Threat Intelligence Platforms

D3 Security Smart SOAR on SecurityListing: SOAR platform for security orchestration, automation, and incident response

4.3(2)
BluSapphire SIEMless™ SIEM

BluSapphire SIEMless™ SIEM

language

Security Information and Event Management

BluSapphire SIEMless™ SIEM on SecurityListing: Distributed SIEM with edge processing, AI filtering, and autonomous response

4.3(2)
JS NICE

JS NICE

language

Digital Forensics and Incident Response

JS NICE on SecurityListing: Statistical renaming, Type inference, and Deobfuscation tool for JavaScript code.

4.3(2)
CyberSight Demo

CyberSight Demo

language

Security Information and Event Management

CyberSight Demo on SecurityListing: Client-facing dashboard for cybersecurity posture visibility and monitoring

4.3(2)
CyberMaxx MaxxMDR

CyberMaxx MaxxMDR

language

Endpoint Detection and Response

CyberMaxx MaxxMDR on SecurityListing: MDR solution combining threat detection, response, and offensive security

4.3(2)
Coro Platform

Coro Platform

language

Data Loss Prevention

Coro Platform on SecurityListing: Unified cybersecurity platform with multiple security modules and single agent

4.3(2)
Echotrail Insights

Echotrail Insights

language

Digital Forensics and Incident Response

Echotrail Insights on SecurityListing: Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.

4.3(2)
Golismero

Golismero

language

Threat Hunting

Golismero on SecurityListing: A free and open-source OSINT framework for gathering and analyzing data from various sources

4.3(2)
Java Decompiler Online

Java Decompiler Online

language

Offensive Security

Java Decompiler Online on SecurityListing: Online Java decompiler tool with support for modern Java features.

4.3(2)
Binary Ninja

Binary Ninja

language

Digital Forensics and Incident Response

Binary Ninja on SecurityListing: Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform with a focus on automation and a clean GUI.

4.3(2)
Logz.io Observability Platform

Logz.io Observability Platform

language

Security Information and Event Management

Logz.io Observability Platform on SecurityListing: Observability platform with log mgmt, metrics, tracing & AI-powered RCA

4.3(2)
Gravwell

Gravwell

language

Security Information and Event Management

Gravwell on SecurityListing: Data analytics platform for security operations with search and automation

4.3(2)
Operating System Based Redirection with Apache mod_rewrite

Operating System Based

language

Offensive Security

Operating System Based Redirection with Apache mod_rewrite on SecurityListing: Detect users' operating systems and perform redirection with Apache mod_rewrite.

4.3(2)
Devo Platform

Devo Platform

language

Threat Intelligence Platforms

Devo Platform on SecurityListing: Integrated SIEM, SOAR, and UEBA platform with AI-driven threat detection

4.3(2)
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence

bohops Leveraging INF-SCT

language

Offensive Security

bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

4.3(2)
Detecting the Elusive - Active Directory Threat Hunting

Detecting the Elusive

language

Threat Hunting

Detecting the Elusive - Active Directory Threat Hunting on SecurityListing: A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

4.3(2)
D3 Smart SOAR

D3 Smart SOAR

language

Threat Hunting

D3 Smart SOAR on SecurityListing: SOAR platform with automated threat hunting and investigation capabilities

4.2(3)
DNIF HYPERCLOUD

DNIF HYPERCLOUD

language

Threat Hunting

DNIF HYPERCLOUD on SecurityListing: SIEM platform with user analytics and automation for threat detection

4.2(3)
Viper

Viper

language

Digital Forensics and Incident Response

Viper on SecurityListing: A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.

3.9(2)
Fraud.com aiReflex

Fraud.com aiReflex

language

Risk Assessment

Fraud.com aiReflex on SecurityListing: AI-powered fraud detection platform for transaction monitoring and prevention

3.8(1)
Honeybrid

Honeybrid

language

Network Security

Honeybrid on SecurityListing: A hybrid honeypot framework that combines low and high interaction honeypots for network security

3.8(1)
LogRhythm Axon

LogRhythm Axon

language

Security Information and Event Management

LogRhythm Axon on SecurityListing: A cloud-native SIEM platform that provides security analytics, intuitive workflow, and simplified incident response to help security teams defend against cyber threats.

3.8(1)
Quorum Cyber Clarity Extend

Quorum Cyber Clarity

language

Threat Hunting

Quorum Cyber Clarity Extend on SecurityListing: Managed detection and response service with 24/7 SOC monitoring

3.8(1)
Hunters SOC Platform

Hunters SOC Platform

language

Threat Hunting

Hunters SOC Platform on SecurityListing: Next-gen SIEM with AI-powered alert investigation and automated response

3.8(1)
Lumifi Endpoint Detection & Response (EDR/XDR)

Lumifi Endpoint Detection

language

Endpoint Detection and Response

Lumifi Endpoint Detection & Response (EDR/XDR) on SecurityListing: Managed EDR/XDR service with 24/7 SOC monitoring and threat response

3.8(1)
edb

edb

language

Digital Forensics and Incident Response

edb on SecurityListing: edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.

3.8(1)
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement

Abusing Exported Functions

language

Offensive Security

Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement on SecurityListing: A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

3.8(1)
Graylog AI-Powered Security

Graylog AI-Powered Security

language

API Security

Graylog AI-Powered Security on SecurityListing: AI-powered SIEM, API security, and log management platform

3.8(1)
Catalyst SOAR

Catalyst SOAR

language

Security Orchestration Automation and Response

Catalyst SOAR on SecurityListing: Catalyst is a SOAR system that automates alert handling and incident response processes, adapting to your workflows and being open source.

3.8(1)
CyberForce

CyberForce

language

Threat Intelligence Platforms

CyberForce|Q COSOC on SecurityListing: 24x7x365 Security Operations Center with threat detection and response services

3.8(1)
Granef

Granef

language

Digital Forensics and Incident Response

Granef on SecurityListing: A network forensics toolkit that transforms network traffic data into graph-based representations for interactive analysis and visualization through a web interface.

3.8(1)
LeakIX

LeakIX

language

Offensive Security

LeakIX on SecurityListing: LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.

3.8(1)
ERM Protect Digital Forensics

ERM Protect Digital

language

Digital Forensics and Incident Response

ERM Protect Digital Forensics on SecurityListing: Digital forensics services provided by ERM Protect

3.8(1)
GroupSense Ransomware Readiness

GroupSense Ransomware Readiness

language

Digital Risk Protection

GroupSense Ransomware Readiness on SecurityListing: Ransomware preparedness & response service with playbooks and negotiation

3.8(1)
DBAppSecurity AiLog Big Data Log Management and Analysis Platform

DBAppSecurity AiLog Big

language

Threat Intelligence Platforms

DBAppSecurity AiLog Big Data Log Management and Analysis Platform on SecurityListing: Big data log management platform for collection, parsing, storage & analysis

3.8(1)
ARM Assembly and Shellcode

ARM Assembly and

language

Offensive Security

ARM Assembly and Shellcode on SecurityListing: A comprehensive collection of resources for learning ARM assembly language and shellcode development.

3.8(1)
Netenrich Adaptive MDR

Netenrich Adaptive MDR

language

Threat Intelligence Platforms

Netenrich Adaptive MDR on SecurityListing: AI-powered MDR service with Google SecOps integration for threat detection

3.8(1)
Huawei SecoManager Security Controller

Huawei SecoManager Security

language

Security Orchestration Automation and Response

Huawei SecoManager Security Controller on SecurityListing: Security controller for policy mgmt, orchestration & log management

3.8(1)
Amazon Detective

Amazon Detective

language

Digital Forensics and Incident Response

Amazon Detective on SecurityListing: A service that analyzes and visualizes security data to investigate potential security issues.

3.8(1)
strings

strings

language

Digital Forensics and Incident Response

strings on SecurityListing: A command-line utility for extracting human-readable text from binary files.

3.8(1)
Proxmark 3

Proxmark 3

language

Offensive Security

Proxmark 3 on SecurityListing: The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.

3.8(1)
Guardpot AI-Powered Cyber Deception

Guardpot AI-Powered Cyber

language

Threat Intelligence Platforms

Guardpot AI-Powered Cyber Deception on SecurityListing: AI-powered deception platform using honeypots to detect & disrupt attacks

3.8(1)
netsniff-ng toolkit

netsniff-ng toolkit

language

Digital Forensics and Incident Response

netsniff-ng toolkit on SecurityListing: netsniff-ng is a free Linux networking toolkit with zero-copy mechanisms for network development, analysis, and auditing.

3.8(1)
checkra1n

checkra1n

language

Offensive Security

checkra1n on SecurityListing: Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

3.8(1)
dc3dd

dc3dd

language

Digital Forensics and Incident Response

dc3dd on SecurityListing: dc3dd is a patch to the GNU dd program, tailored for forensic acquisition with features like hashing and file verification.

3.8(1)
THOR Lite

THOR Lite

language

Digital Forensics and Incident Response

THOR Lite on SecurityListing: A free, fast, and flexible multi-platform IOC and YARA scanner for Windows, Linux, and macOS.

3.8(1)
Google Search Operators: The Complete List (44 Advanced Operators)

Google Search Operators:

language

Threat Hunting

Google Search Operators: The Complete List (44 Advanced Operators) on SecurityListing: A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.

3.8(1)
Gradient Cyber Quorum™

Gradient Cyber Quorum™

language

Threat Intelligence Platforms

Gradient Cyber Quorum™ on SecurityListing: Unified threat detection platform for network, endpoint, cloud, and user telemetry

3.8(1)
Charles Web Debugging Proxy

Charles Web Debugging

language

Digital Forensics and Incident Response

Charles Web Debugging Proxy on SecurityListing: An HTTP proxy, monitor, and reverse proxy tool for viewing HTTP and SSL/HTTPS traffic.

3.8(1)
Huntress Managed Security Platform

Huntress Managed Security

language

Endpoint Detection and Response

Huntress Managed Security Platform on SecurityListing: Managed security platform with EDR, ITDR, SIEM, and SAT backed by 24/7 SOC

3.8(1)
Randomized Malleable C2 Profiles Made Easy

Randomized Malleable C2

language

Penetration Testing

Randomized Malleable C2 Profiles Made Easy on SecurityListing: Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

3.8(1)
Kojoney

Kojoney

language

Security Operations

Kojoney on SecurityListing: A honeypot for the SSH Service

3.8(1)
Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker

Loading Alternate Data

language

Offensive Security

Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker on SecurityListing: Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.

3.8(1)
Workbench

Workbench

language

Digital Forensics and Incident Response

Workbench on SecurityListing: A scalable python framework for security research and development teams.

3.8(1)
extundelete

extundelete

language

Digital Forensics and Incident Response

extundelete on SecurityListing: A utility for recovering deleted files from ext3 or ext4 partitions.

3.8(1)
LockBoxx

LockBoxx

language

Offensive Security

LockBoxx on SecurityListing: Introduction to using GScript for Red Teams

3.8(1)
Logz.io Infrastructure Monitoring

Logz.io Infrastructure Monitoring

language

Security Information and Event Management

Logz.io Infrastructure Monitoring on SecurityListing: Prometheus-based infrastructure monitoring with unified logs, metrics, and traces

3.8(1)
Mature SIEM Environment for SOAR Implementation

Mature SIEM Environment

language

Security Orchestration Automation and Response

Mature SIEM Environment for SOAR Implementation on SecurityListing: A mature SIEM environment is critical for successful SOAR implementation.

3.8(1)
NETRESEC

NETRESEC

language

Digital Forensics and Incident Response

NETRESEC on SecurityListing: Independent software vendor specializing in network security tools and network forensics.

3.8(1)
FastIntercept

FastIntercept

language

Security Orchestration Automation and Response

FastIntercept on SecurityListing: Fast Intercept is a security automation platform that empowers users to maximize their existing security products and automate routine tasks.

3.8(1)
Foremost

Foremost

language

Digital Forensics and Incident Response

Foremost on SecurityListing: A console program for file recovery through data carving.

3.8(1)
Ekasha Incident Management

Ekasha Incident Management

language

Security Orchestration Automation and Response

Ekasha Incident Management on SecurityListing: Incident management platform with automation, workflows, and playbooks

3.8(1)
Intezer

Intezer

language

Threat Hunting

Intezer on SecurityListing: Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

3.8(1)
Bastille-Linux

Bastille-Linux

language

Offensive Security

Bastille-Linux on SecurityListing: Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.

3.8(1)
Simbian AI SOC Agent

Simbian AI SOC

language

Security Orchestration Automation and Response

Simbian AI SOC Agent on SecurityListing: AI agent that autonomously investigates, triages, and responds to security alerts

Todyl Unified Platform

Todyl Unified Platform

language

Managed Detection and Response

Todyl Unified Platform on SecurityListing: Unified cybersecurity platform for MSPs with SASE, EDR, SIEM, MXDR, and GRC

Stellar Cyber Multi-Layer AI™

Stellar Cyber Multi-Layer

language

Threat Hunting

Stellar Cyber Multi-Layer AI™ on SecurityListing: AI-driven XDR platform with detection, correlation, investigation, and response

ServiceNow Security Operations

ServiceNow Security Operations

language

Threat Intelligence Platforms

ServiceNow Security Operations on SecurityListing: Platform for automating threat and vulnerability mgmt with incident response

Simbian AI Threat Hunt Agent

Simbian AI Threat

language

Threat Hunting

Simbian AI Threat Hunt Agent on SecurityListing: AI agent that autonomously validates threat hunt hypotheses across enterprise data

Censys Threat Hunting

Censys Threat Hunting

language

Threat Hunting

Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure

xenex xenexFoundation

xenex xenexFoundation

language

API Security

xenex xenexFoundation on SecurityListing: Cloud-based Security Operations-as-a-Service with XDR engine and 700+ connectors

D3 Security Morpheus AI

D3 Security Morpheus

language

Threat Hunting

D3 Security Morpheus AI on SecurityListing: AI-powered autonomous SOC platform for alert triage and investigation automation

Graylog SIEM

Graylog SIEM

language

API Security

Graylog SIEM on SecurityListing: AI-powered SIEM platform for security operations, log management, and API security

Stackstorm

Stackstorm

language

Security Orchestration Automation and Response

Stackstorm on SecurityListing: StackStorm is an open-source automation platform that connects and automates DevOps workflows and integrates with existing infrastructure.

Tracebit Dynamic Security Canaries

Tracebit Dynamic Security

language

Cloud Security

Tracebit Dynamic Security Canaries on SecurityListing: Cloud-native deception platform deploying dynamic security canaries

Acronis Cyber Protect Cloud

Acronis Cyber Protect

language

Data Loss Prevention

Acronis Cyber Protect Cloud on SecurityListing: Cloud-based XDR platform for MSPs with AI-guided detection and response

Sophos Central

Sophos Central

language

Multi-Factor Authentication and Single Sign-On

Sophos Central on SecurityListing: Cloud-based platform for unified mgmt of Sophos security solutions

tcpkill

tcpkill

language

Penetration Testing

tcpkill on SecurityListing: A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.

StrangeBee TheHive IaaS Images

StrangeBee TheHive IaaS

language

Security Orchestration Automation and Response

StrangeBee TheHive IaaS Images on SecurityListing: Collaborative case management platform for incident response and investigation

The Security Ledger

The Security Ledger

language

Offensive Security

The Security Ledger on SecurityListing: Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.

SolarWinds Observability

SolarWinds Observability

language

Database Security

SolarWinds Observability on SecurityListing: Unified observability platform for IT infrastructure, apps, and databases

SIRP OmniSense™

SIRP OmniSense™

language

Threat Intelligence Platforms

SIRP OmniSense™ on SecurityListing: AI-native autonomous SOC platform for threat detection and response

Trellix Wise Tour

Trellix Wise Tour

language

Endpoint Detection and Response

Trellix Wise Tour on SecurityListing: Interactive product tours for Trellix security platform and products

Torq Hyperautomation

Torq Hyperautomation

language

Threat Intelligence Platforms

Torq Hyperautomation on SecurityListing: Security hyperautomation platform for SOC workflow automation with AI agents

ThreatSpike Blue

ThreatSpike Blue

language

Endpoint Detection and Response

ThreatSpike Blue on SecurityListing: Managed detection and response platform with EDR, email, network, and cloud security

Theos Managed Threat Detection & Response

Theos Managed Threat

language

Threat Hunting

Theos Managed Threat Detection & Response on SecurityListing: 24/7 managed threat detection and response service with SOC monitoring

TENEX Incident Response

TENEX Incident Response

language

Threat Hunting

TENEX Incident Response on SecurityListing: AI-driven MDR service with automated incident response and threat detection

Sumo Logic Cloud SIEM

Sumo Logic Cloud

language

Threat Hunting

Sumo Logic Cloud SIEM on SecurityListing: Cloud-native SIEM for real-time threat detection and investigation

WebDAV Covert Channel

WebDAV Covert Channel

language

Offensive Security

WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.

Stellar Cyber Multi-Layered AI Platform

Stellar Cyber Multi-Layered

language

Extended Detection and Response

Stellar Cyber Multi-Layered AI Platform on SecurityListing: AI-driven Open XDR platform for MSSPs with multi-tenancy and automation

SimSpace Attack Catalog

SimSpace Attack Catalog

language

Cyber Range Training

SimSpace Attack Catalog on SecurityListing: Catalog of simulated attack scenarios for cyber defense training and validation

Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection

Strengthen Your Phishing

language

Offensive Security

Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection on SecurityListing: A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions

Seceon aiSIEM

Seceon aiSIEM

language

Security Information and Event Management

Seceon aiSIEM on SecurityListing: AI-powered SIEM with automated threat detection and response capabilities

SimSpace Cyber Range Platform

SimSpace Cyber Range

language

Threat Intelligence Platforms

SimSpace Cyber Range Platform on SecurityListing: Cyber range platform for training, testing, and validating security controls.

StrangeBee TheHive

StrangeBee TheHive

language

Security Orchestration Automation and Response

StrangeBee TheHive on SecurityListing: Security case management platform for SOCs, CERTs, and CSIRTs

7AI Platform

7AI Platform

language

Threat Hunting

7AI Platform on SecurityListing: Autonomous AI agents for security alert investigation and response automation

Logpoint SIEM

Logpoint SIEM

language

Security Information and Event Management

Logpoint SIEM on SecurityListing: A security information and event management solution that collects, normalizes, and analyzes log data from across an organization's infrastructure to enhance threat detection and compliance reporting.

win10upgrade

win10upgrade

language

Threat Intelligence Platforms

win10upgrade on SecurityListing: MetaDefender Cloud offers advanced threat prevention using technologies like Multiscanning, Deep CDR, and Sandbox.

Exabeam Security Operations Platform

Exabeam Security Operations

language

Security Information and Event Management

Exabeam Security Operations Platform on SecurityListing: Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.

SCADA HoneyNet Project

SCADA HoneyNet Project

language

Network Security

SCADA HoneyNet Project on SecurityListing: Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.

CSIS Managed Detection & Response

CSIS Managed Detection

language

Brand Protection

CSIS Managed Detection & Response on SecurityListing: MDR service with threat intel, digital risk protection, and incident response

The Sleuth Kit & Autopsy

The Sleuth Kit

language

Digital Forensics and Incident Response

The Sleuth Kit & Autopsy on SecurityListing: Autopsy is a GUI-based digital forensics platform for analyzing hard drives and smart phones, with a plug-in architecture for custom modules.

Axence ConnectPro

Axence ConnectPro

language

Digital Forensics and Incident Response

Axence ConnectPro on SecurityListing: Remote access and IT support tool for workstation management and diagnostics

Project Honey Pot

Project Honey Pot

language

Security Operations

Project Honey Pot on SecurityListing: The Web's Largest Community Tracking Online Fraud & Abuse

Sumo Logic Logs for Security

Sumo Logic Logs

language

Security Information and Event Management

Sumo Logic Logs for Security on SecurityListing: Cloud-based log analytics platform for security monitoring and threat detection

Bleeping Computer

Bleeping Computer

language

Offensive Security

Bleeping Computer on SecurityListing: A customizable offensive security reporting solution for pentesters and red teamers to generate detailed reports of their findings and vulnerabilities.

Using a SCF file to Gather Hashes

Using a SCF

language

Offensive Security

Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

OWASP Bricks

OWASP Bricks

language

Penetration Testing

OWASP Bricks on SecurityListing: Deliberately vulnerable web application for security professionals to practice attack techniques.

Sumo Logic Application Modernization

Sumo Logic Application

language

Security Information and Event Management

Sumo Logic Application Modernization on SecurityListing: Cloud-based log analytics & monitoring platform for app modernization

Senseon Intelligence Cloud

Senseon Intelligence Cloud

language

Threat Hunting

Senseon Intelligence Cloud on SecurityListing: AI-driven SIEM alternative with managed SOC for threat detection and response

Rewterz XDR

Rewterz XDR

language

Threat Intelligence Platforms

Rewterz XDR on SecurityListing: XDR platform for threat monitoring, detection, and response across environments

UPX

UPX

language

Offensive Security

UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.

Reverse Engineering HID iClass Master Keys

Reverse Engineering HID

language

Offensive Security

Reverse Engineering HID iClass Master Keys on SecurityListing: Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.

Security Intelligence

Security Intelligence

language

Offensive Security

Security Intelligence on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution

ClickOnce (Twice or

language

Penetration Testing

ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution on SecurityListing: A technique for social engineering and untrusted command execution using ClickOnce technology

DDE attack with PowerShell Empire

DDE attack with

language

Offensive Security

DDE attack with PowerShell Empire on SecurityListing: Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.

Sigma Query

Sigma Query

language

Threat Hunting

Sigma Query on SecurityListing: Searchable repository of Sigma detection rules for threat hunting and SIEM

Slavehack 2

Slavehack 2

language

Cyber Range Training

Slavehack 2 on SecurityListing: Online hacking game with realistic hacking experience and player interaction.

snmpcheck

snmpcheck

language

Offensive Security

snmpcheck on SecurityListing: A tool for enumerating information via SNMP protocol.

AfterGlow

AfterGlow

language

Threat Hunting

AfterGlow on SecurityListing: Visualize and analyze network relationships with AfterGlow

Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory

Lab of a

language

Offensive Security

Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory on SecurityListing: Abusing DNSAdmins privilege for escalation in Active Directory

Redline

Redline

language

Digital Forensics and Incident Response

Redline on SecurityListing: A free endpoint security tool for host investigative capabilities to find signs of malicious activity through memory and file analysis.

MaxxMDR MDR + NDR

MaxxMDR MDR +

language

Threat Hunting

MaxxMDR MDR + NDR on SecurityListing: Managed detection & response with network detection & response capabilities

Windows 7 UAC Whitelist Code-Injection Issue

Windows 7 UAC

language

API Security

Windows 7 UAC Whitelist Code-Injection Issue on SecurityListing: Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

ThisisLegal.com

ThisisLegal.com

language

Cyber Range Training

ThisisLegal.com on SecurityListing: Hacker wargames site with forums and tutorials, fostering a learning community.

SecGame #1: Sauron

SecGame #1: Sauron

language

Penetration Testing

SecGame #1: Sauron on SecurityListing: A Linux-based environment for penetration testing and vulnerability exploitation

Troy Hunt

Troy Hunt

language

Offensive Security

Troy Hunt on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

Reveald ManagedDetection and Response

Reveald ManagedDetection and

language

Threat Hunting

Reveald ManagedDetection and Response on SecurityListing: MDR service for CrowdStrike, Microsoft, and Trellix endpoints with 24/7 monitoring

Serving Random Payloads with Apache mod_rewrite

Serving Random Payloads

language

Penetration Testing

Serving Random Payloads with Apache mod_rewrite on SecurityListing: A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

WayBackMachine

WayBackMachine

language

Digital Forensics and Incident Response

WayBackMachine on SecurityListing: A digital archive of the internet, allowing users to capture and browse archived web pages.

Performanta Safe XDR

Performanta Safe XDR

language

Extended Detection and Response

Performanta Safe XDR on SecurityListing: XDR service for continuous threat exposure management and automated response

PAGO DeepACT

PAGO DeepACT

language

Threat Hunting

PAGO DeepACT on SecurityListing: MDR platform combining threat detection, hunting, and real-time containment

Company Chat Widget

Company Chat Widget

language

Threat Hunting

Company Chat Widget on SecurityListing: Managed Detection and Response service provider

ResourcesExtract

ResourcesExtract

language

Digital Forensics and Incident Response

ResourcesExtract on SecurityListing: Extracts resources (bitmaps, icons, cursors, AVI movies, HTML files, and more) from dll files

PowerUpSQL

PowerUpSQL

language

Penetration Testing

PowerUpSQL on SecurityListing: Tool for attacking Active Directory environments through SQL Server access.

Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation

Trust Direction: An

language

Offensive Security

Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

NetWitness Threat Detection & Response

NetWitness Threat Detection

language

Endpoint Detection and Response

NetWitness Threat Detection & Response on SecurityListing: XDR platform combining NDR, EDR, SIEM, SOAR & UEBA for threat detection

Steghide

Steghide

language

Digital Forensics and Incident Response

Steghide on SecurityListing: Steghide is a steganography program for hiding data in image and audio files.

Radiant Agentic AI

Radiant Agentic AI

language

Threat Hunting

Radiant Agentic AI on SecurityListing: AI-powered SOC platform for automated alert triage, incident response & logging

Netenrich Resolution Intelligence Cloud

Netenrich Resolution Intelligence

language

Threat Hunting

Netenrich Resolution Intelligence Cloud on SecurityListing: Cloud-native data analytics platform for security and digital ops management

Tracking a stolen code-signing certificate with osquery

Tracking a stolen

language

Digital Forensics and Incident Response

Tracking a stolen code-signing certificate with osquery on SecurityListing: Detect signed malware and track stolen code-signing certificates using osquery.

MFT Parsers Review

MFT Parsers Review

language

Digital Forensics and Incident Response

MFT Parsers Review on SecurityListing: Review of various MFT parsers used in digital forensics for analyzing NTFS file systems.

Wifislax

Wifislax

language

Penetration Testing

Wifislax on SecurityListing: GNU/Linux Wireless distribution for security testing with XFCE desktop environment.

WeChall

WeChall

language

Cyber Range Training

WeChall on SecurityListing: A free online wargame for practicing hacking skills and learning security concepts.

Windows Oneliners for Remote Code Execution

Windows Oneliners for

language

Offensive Security

Windows Oneliners for Remote Code Execution on SecurityListing: Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

The DFIR Report

The DFIR Report

language

Threat Intelligence Platforms

The DFIR Report on SecurityListing: In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

AxoFlow AxoRouter

AxoFlow AxoRouter

language

Data Classification

AxoFlow AxoRouter on SecurityListing: Security data pipeline platform for collection, routing, and processing

Tines Platform

Tines Platform

language

Security Orchestration Automation and Response

Tines Platform on SecurityListing: Workflow automation platform for building and monitoring security workflows

X-Ways Forensics

X-Ways Forensics

language

Digital Forensics and Incident Response

X-Ways Forensics on SecurityListing: Advanced computer forensics software with efficient features.

XSS'OR

XSS'OR

language

Offensive Security

XSS'OR on SecurityListing: Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.

ORNA Breach Response & Digital Forensics

ORNA Breach Response

language

Digital Forensics and Incident Response

ORNA Breach Response & Digital Forensics on SecurityListing: 24/7 breach response and digital forensics service for incident handling

Ranges – Cyber Warfare Range LLC

Ranges – Cyber

language

Cyber Range Training

Ranges – Cyber Warfare Range LLC on SecurityListing: A network of physical and online cyber warfare ranges for training and testing

SOAR

SOAR

language

Threat Hunting

SOAR on SecurityListing: A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.

syslog-ng Store Box

syslog-ng Store Box

language

Security Information and Event Management

syslog-ng Store Box on SecurityListing: Enterprise log management appliance for collecting, indexing, and searching logs

Cribl Edge

Cribl Edge

language

Security Information and Event Management

Cribl Edge on SecurityListing: Vendor-neutral agent for unified telemetry collection across distributed infra

tcpreplay

tcpreplay

language

Offensive Security

tcpreplay on SecurityListing: Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

RTIR

RTIR

language

Digital Forensics and Incident Response

RTIR on SecurityListing: Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.

Preparing for Red Team at PRCCDC 2015

Preparing for Red

language

Penetration Testing

Preparing for Red Team at PRCCDC 2015 on SecurityListing: Preparation process for participating in the Pacific Rim CCDC 2015.

Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)

Leveraging INF-SCT Fetch

language

Offensive Security

Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2) on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

Timeline Explorer v0.4.0.0

Timeline Explorer v0.4.0.0

language

Digital Forensics and Incident Response

Timeline Explorer v0.4.0.0 on SecurityListing: A powerful tool for analyzing and visualizing system activity timelines.

WinHex

WinHex

language

Digital Forensics and Incident Response

WinHex on SecurityListing: Universal hexadecimal editor for computer forensics, data recovery, and IT security.

Blumira SOC Auto-Focus

Blumira SOC Auto-Focus

language

Endpoint Detection and Response

Blumira SOC Auto-Focus on SecurityListing: XDR platform with AI-enhanced SIEM, automated response, and endpoint visibility

Webhacking.kr

Webhacking.kr

language

Vulnerability Assessment

Webhacking.kr on SecurityListing: Korean cyber-security challenge platform for exploiting and defending web application vulnerabilities.

UTMStack Real-time SIEM & XDR

UTMStack Real-time SIEM

language

Extended Detection and Response

UTMStack Real-time SIEM & XDR on SecurityListing: Open source SIEM and XDR platform for real-time threat detection and response

Stellar Cyber AI-Based Open XDR

Stellar Cyber AI-Based

language

Extended Detection and Response

Stellar Cyber AI-Based Open XDR on SecurityListing: AI-based Open XDR platform integrating NDR, AD, and FW for threat detection

Tines AI-driven SOC

Tines AI-driven SOC

language

Security Orchestration Automation and Response

Tines AI-driven SOC on SecurityListing: AI-driven workflow automation platform for SOC operations and security tasks

Cymph Security Playbooks

Cymph Security Playbooks

language

Security Orchestration Automation and Response

Cymph Security Playbooks on SecurityListing: A vendor-agnostic product for managing and analyzing cybersecurity playbooks.

Todyl Managed eXtended Detection & Response

Todyl Managed eXtended

language

Endpoint Detection and Response

Todyl Managed eXtended Detection & Response on SecurityListing: 24/7 managed XDR service with SOC, threat hunting, and dedicated analysts

Trellix Wise

Trellix Wise

language

Endpoint Detection and Response

Trellix Wise on SecurityListing: GenAI-powered security operations platform for automated alert investigation

SimSpace Cyber Range

SimSpace Cyber Range

language

Cyber Range Training

SimSpace Cyber Range on SecurityListing: Cyber range platform for training, testing, and validating security readiness

Torq HyperSOC

Torq HyperSOC

language

Security Orchestration Automation and Response

Torq HyperSOC on SecurityListing: AI-powered SOC platform for autonomous alert triage, investigation & response

Vshadow

Vshadow

language

Offensive Security

Vshadow on SecurityListing: A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.

VX-Underground

VX-Underground

language

Threat Intelligence Platforms

VX-Underground on SecurityListing: VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

WebMax Tools Privacy Encoders / Decoders / Hash Generators

WebMax Tools Privacy

language

Digital Forensics and Incident Response

WebMax Tools Privacy Encoders / Decoders / Hash Generators on SecurityListing: Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.

Huntress Managed SIEM

Huntress Managed SIEM

language

Threat Hunting

Huntress Managed SIEM on SecurityListing: Managed SIEM with 24/7 AI-assisted SOC for threat detection and compliance

Sucuri Website Malware Removal & Protection

Sucuri Website Malware

language

Digital Forensics and Incident Response

Sucuri Website Malware Removal & Protection on SecurityListing: Website malware removal service with WAF, monitoring, and cleanup support

Workshop Hacking Bluetooth Smart locks

Workshop Hacking Bluetooth

language

Offensive Security

Workshop Hacking Bluetooth Smart locks on SecurityListing: A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.

Netsurion Managed Detection and Response

Netsurion Managed Detection

language

Threat Hunting

Netsurion Managed Detection and Response on SecurityListing: MDR service with 24x7 SOC, XDR platform, and threat hunting capabilities

SolarWinds Incident Response

SolarWinds Incident Response

language

Digital Forensics and Incident Response

SolarWinds Incident Response on SecurityListing: Incident response platform for alert management, collaboration, and remediation

Simbian AI Security Operations

Simbian AI Security

language

Penetration Testing

Simbian AI Security Operations on SecurityListing: AI-powered security operations platform for autonomous alert triage & response

xxd

xxd

language

Digital Forensics and Incident Response

xxd on SecurityListing: A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.

Tracecat

Tracecat

language

Security Orchestration Automation and Response

Tracecat on SecurityListing: Open-source security automation platform for automating security alerts and building AI-assisted workflows.

Securonix Unified Defense SIEM

Securonix Unified Defense

language

Threat Intelligence Platforms

Securonix Unified Defense SIEM on SecurityListing: Cloud-native SIEM platform with UEBA, SOAR, TIP, and TDIR capabilities

SECUINFRA Cyber Defense

SECUINFRA Cyber Defense

language

Managed Detection and Response

SECUINFRA Cyber Defense on SecurityListing: German MDR & IR provider offering 24/7 threat detection and incident response

CrowdStrike Falcon Next-Gen SIEM

CrowdStrike Falcon Next-Gen

language

Threat Intelligence Platforms

CrowdStrike Falcon Next-Gen SIEM on SecurityListing: AI-native SIEM platform for consolidating security tools and data

Seceon aiXDR-PMAX

Seceon aiXDR-PMAX

language

Data Loss Prevention

Seceon aiXDR-PMAX on SecurityListing: XDR platform with endpoint protection, detection, and automated response

Seceon OTM Platform

Seceon OTM Platform

language

Extended Detection and Response

Seceon OTM Platform on SecurityListing: All-in-one platform combining SIEM, XDR, SOAR with AI/ML threat detection

Sekoia Cyber Threat Intelligence

Sekoia Cyber Threat

language

Threat Intelligence Platforms

Sekoia Cyber Threat Intelligence on SecurityListing: CTI platform providing structured threat intelligence and analysis

Seceon aiSIEM CGuard 2.0

Seceon aiSIEM CGuard

language

Security Information and Event Management

Seceon aiSIEM CGuard 2.0 on SecurityListing: AI-powered SIEM for cloud security across Microsoft 365, Azure, AWS, and GCP

Reveald ManagedExtended Detection and Response XDR

Reveald ManagedExtended Detection

language

Threat Hunting

Reveald ManagedExtended Detection and Response XDR on SecurityListing: Managed XDR service built on CrowdStrike Falcon LogScale platform

Theos Red Teaming

Theos Red Teaming

language

Offensive Security

Theos Red Teaming on SecurityListing: Red teaming service simulating real-world adversary attacks on organizations.

Gradient Cyber MXDR

Gradient Cyber MXDR

language

Threat Hunting

Gradient Cyber MXDR on SecurityListing: Managed XDR service with 24/7 SOC for mid-market threat detection & response

WinDbg

WinDbg

language

Digital Forensics and Incident Response

WinDbg on SecurityListing: Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.

Talion Managed Detection & Response (MDR)

Talion Managed Detection

language

Threat Hunting

Talion Managed Detection & Response (MDR) on SecurityListing: 24/7 MDR service with threat hunting, containment, and SOC collaboration

Stellar Cyber Human-Augmented Autonomous SOC

Stellar Cyber Human-Augmented

language

Extended Detection and Response

Stellar Cyber Human-Augmented Autonomous SOC on SecurityListing: AI-native SecOps platform combining SIEM, XDR, NDR, ITDR, and UEBA capabilities

tcpxtract

tcpxtract

language

Digital Forensics and Incident Response

tcpxtract on SecurityListing: A tool for extracting files from network traffic based on file signatures with support for various file formats and scalable search algorithm.

syslog-ng

syslog-ng

language

Security Information and Event Management

syslog-ng on SecurityListing: A log management solution that optimizes SIEM performance, provides rapid search and troubleshooting, and meets compliance requirements.

syslog-ng Premium Edition

syslog-ng Premium Edition

language

Database Security

syslog-ng Premium Edition on SecurityListing: Enterprise log management software for collecting and centralizing log data

syslog-ng Open Source Edition

syslog-ng Open Source

language

Security Information and Event Management

syslog-ng Open Source Edition on SecurityListing: Open-source log collection, processing, and forwarding tool for log management

Trellix Security Platform

Trellix Security Platform

language

Threat Intelligence Platforms

Trellix Security Platform on SecurityListing: AI-powered security platform for detection, response, and threat protection

Sumo Logic Dojo AI

Sumo Logic Dojo

language

Security Information and Event Management

Sumo Logic Dojo AI on SecurityListing: Cloud SIEM platform with AI-powered security analytics and automation

Sumo Logic Monitoring and Troubleshooting

Sumo Logic Monitoring

language

Security Information and Event Management

Sumo Logic Monitoring and Troubleshooting on SecurityListing: Log analytics platform for monitoring, troubleshooting, and issue detection

tcpick

tcpick

language

Digital Forensics and Incident Response

tcpick on SecurityListing: A textmode sniffer for tracking tcp streams and capturing data in various modes.

ORNA End-to-End AI Cyber Incident Response Platform

ORNA End-to-End AI

language

Threat Intelligence Platforms

ORNA End-to-End AI Cyber Incident Response Platform on SecurityListing: AI-powered cyber incident response platform for training, orchestration & mgmt

testdisk

testdisk

language

Digital Forensics and Incident Response

testdisk on SecurityListing: TestDisk is a free data recovery software that can recover lost partitions and undelete files from various file systems.

WindowsSCOPE

WindowsSCOPE

language

Digital Forensics and Incident Response

WindowsSCOPE on SecurityListing: A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.

StrangeBee TheHive Cloud Platform

StrangeBee TheHive Cloud

language

Security Orchestration Automation and Response

StrangeBee TheHive Cloud Platform on SecurityListing: SaaS security case management platform for incident response teams

Tao Security

Tao Security

language

Offensive Security

Tao Security on SecurityListing: Sysreptor provides a customizable reporting platform for pentesters and red teamers to efficiently document security assessments.