Safely simulate malicious network traffic.
Tools that monitor
Detect threats, anomalies or policy violations at runtime.
56 tools indexed
Cloud forensics for Azure / O365.
Web-based SSH bastion and key manager.
Cloud-native open-source WAF.
Tripwire tokens for free.
Hunt across Windows event logs at speed.
Medium-interaction SSH/Telnet honeypot.
Hunt PowerShell attacks in Windows logs.
Component analysis platform.
Automated detection lab environment.
SSH tarpit that wastes attacker time.
FIR
—Fast Incident Response platform.
Ban hosts that fail auth too often.
Runtime security for containers.
Open vulnerability management platform.
Adversary tradecraft detection on Windows.
Osquery-powered device management.
Open log management.
HELK
—The Hunting ELK stack.
Windows event log threat hunter.
Open-source adversary emulation platform.
Visualize Windows logon events.
Automated adversary emulation.
Malicious-traffic detection system.