SOAR View SOAR
Cortex XSOAR is a comprehensive SOAR platform that automates and standardizes security processes for faster response times and increased team productivity.
Showing 11256 tools • Searched in 3ms
Cortex XSOAR is a comprehensive SOAR platform that automates and standardizes security processes for faster response times and increased team productivity.
replayproxy allows you to 're-live' a HTTP session captured in a .pcap file, parsing HTTP streams, caching them, and starting a HTTP proxy to reply to requests with matching responses.
PCAPdroid is a privacy-friendly app for tracking, analyzing, and blocking network connections on your device.
A printer honeypot PoC that simulates a printer on a network to detect and analyze potential attackers.
A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.
A collection of scripts for debugging SSRF, blind XSS, and XXE vulnerabilities
CimSweep is a suite of CIM/WMI-based tools for incident response and hunting operations on Windows systems without the need to deploy an agent.
Django based web application for network traffic analysis with protocol handling capabilities.
Metta is an information security preparedness tool for adversarial simulation.
A practical guide on NTLM relaying for Active Directory attacks.
A forensics tool for tracking USB device artifacts on Linux machines.
A simple framework for extracting actionable data from Android malware
A tool that scans for accessibility tools backdoors via RDP
A wargame designed to test your hacking skills and knowledge
A vulnerable by design infrastructure on Azure featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfigurations.
A free, open-source tool that uncovers persistently installed software on macOS, helping to generically reveal malware.
A comprehensive collection of security assessment lists for security testers.
Open source software for leveraging insights from flow and packet analysis to identify potential security threats or attacks.
Web application for visualizing live GPS locations on an SVG world map using honeypot captures.
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.
A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.