Home / Operations Management / Security Operations

Security Operations

Tools for security operations including incident response, threat hunting and SOC automation

Try these 133 AI Security Operations Tools

AbuseIO
Free

AbuseIO

StackStorm is an open-source automation platform that connects and automates DevOps workflows and integrates with existing infrastructure.

Admyral
Free

Admyral

Sample security playbooks for security automation, orchestration and response (SOAR) using Microsoft Sentinel trigger

AIL Framework
Free

AIL Framework

A project that uses Athena and EventBridge to investigate API activity and notify of actions for incident response and misconfiguration detection.

Alerting and Detection Strategies Framework
Free

Alerting and Detection Strategies Framework

Migrated Splunk SOAR Connectors to new GitHub organization for better organization and management.

Anvilogic
Free

Anvilogic

AWS Community repository of custom Config rules with instructions for leveraging and developing AWS Config Rules.

Anomali
Free

Anomali

A collection of incident response methodologies for various security incidents, providing easy-to-use operational best practices.

Auditd Configuration Best Practices
Free

Auditd Configuration Best Practices

A DFIR console integrating various cybersecurity tools and frameworks for efficient incident response.

AutoTTP
Free

AutoTTP

Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation.

AWS Auto Remediate
Free

AWS Auto Remediate

A public incident response process documentation used at PagerDuty

AWS Config Rules Repository
Free

AWS Config Rules Repository

A remediation orchestration platform that consolidates security alerts, automates triage, and streamlines the remediation process across hybrid environments.

AWS Elastic Disaster Recovery
Free

AWS Elastic Disaster Recovery

A data curation platform that automates security data collection, transformation and routing while reducing data volume and infrastructure costs.

Aurora Incident Response
Free

Aurora Incident Response

A proof of concept for using the SSM Agent in Fargate for incident response

AWS IR
Free

AWS IR

Detect signed malware and track stolen code-signing certificates using osquery.

AWS Incident Response Kit (AIRK)
Free

AWS Incident Response Kit (AIRK)

DFIRTrack is an open source web application focused on incident response for handling major incidents with many affected systems, tracking system status, tasks, and artifacts.

AWS Incident Response Runbook Samples
Free

AWS Incident Response Runbook Samples

A defense-in-depth security automation and monitoring framework utilizing threat intelligence, machine learning, and serverless technologies.

AWS Incident Response Investigation of API activity using Athena and notification of actions using EventBridge
Free

AWS Incident Response Investigation of API activity using Athena and notification of actions using EventBridge

An AI-powered security operations platform that automates alert investigation, triage, and response workflows for SOC analysts.

AWS Security Automation
Free

AWS Security Automation

A web collaborative platform for incident responders to share technical details during investigations, shipped in Docker containers for easy installation and upgrades.

AWS Security Architectures
Free

AWS Security Architectures

A Serverless Security Orchestration Automation and Response (SOAR) Framework for AWS GuardDuty with various supported actions.

AxoFlow
Free

AxoFlow

CimSweep is a suite of CIM/WMI-based tools for incident response and hunting operations on Windows systems without the need to deploy an agent.

Catalyst
Free

Catalyst

Repository of playbooks, scripts, and templates for automating and orchestrating Security Operations.

CBRX
Free

CBRX

StackStorm is an open-source automation platform that connects and automates DevOps workflows and integrates with existing infrastructure.

CimSweep
Free

CimSweep

A collection of Cyber Incident Response Playbook Battle Cards (PBC) for combating cyber threats and attacks, following a prescriptive approach inspired by CERT Societe Generale's IRM.