Compare commits
17 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 33d903c32b | |||
| d2231996bf | |||
| 02523fdff7 | |||
| 00391781af | |||
| f8ee8314b7 | |||
| 52614c3dc1 | |||
| a82e54f9d1 | |||
| d358a11d8b | |||
| 70190e096f | |||
| 7eea174ab4 | |||
| 5ffed0d0e2 | |||
| caaef9e578 | |||
| 88a1513f28 | |||
| c9de1ce38e | |||
| 8bae9c21bb | |||
| 7452572aa7 | |||
| cd782c489d |
@@ -16,7 +16,7 @@ Many cybersecurity professionals enable racist state violence, wittingly or unwi
|
||||
|
||||
## Contents
|
||||
|
||||
- [Automation](#automation)
|
||||
- [Automation and Convention](#automation-and-convention)
|
||||
- [Code libraries and bindings](#code-libraries-and-bindings)
|
||||
- [Security Orchestration, Automation, and Response (SOAR)](#security-orchestration-automation-and-response-soar)
|
||||
- [Cloud platform security](#cloud-platform-security)
|
||||
@@ -44,6 +44,7 @@ Many cybersecurity professionals enable racist state violence, wittingly or unwi
|
||||
- [Operating System distributions](#operating-system-distributions)
|
||||
- [Phishing awareness and reporting](#phishing-awareness-and-reporting)
|
||||
- [Preparedness training and wargaming](#preparedness-training-and-wargaming)
|
||||
- [Post-engagement analysis and reporting](#post-engagement-analysis-and-reporting)
|
||||
- [Security configurations](#security-configurations)
|
||||
- [Security monitoring](#security-monitoring)
|
||||
- [Endpoint Detection and Response (EDR)](#endpoint-detection-and-response-edr)
|
||||
@@ -61,12 +62,13 @@ Many cybersecurity professionals enable racist state violence, wittingly or unwi
|
||||
- [Windows-based defenses](#windows-based-defenses)
|
||||
- [Active Directory](#active-directory)
|
||||
|
||||
## Automation
|
||||
## Automation and Convention
|
||||
|
||||
- [Ansible Lockdown](https://ansiblelockdown.io/) - Curated collection of information security themed Ansible roles that are both vetted and actively maintained.
|
||||
- [Clevis](https://github.com/latchset/clevis) - Plugable framework for automated decryption, often used as a Tang client.
|
||||
- [DShell](https://github.com/USArmyResearchLab/Dshell) - Extensible network forensic analysis framework written in Python that enables rapid development of plugins to support the dissection of network packet captures.
|
||||
- [Dev-Sec.io](https://dev-sec.io/) - Server hardening framework providing Ansible, Chef, and Puppet implementations of various baseline security configurations.
|
||||
- [Password Manager Resources](https://github.com/apple/password-manager-resources) - Collaborative, crowd-sourced data and code to make password management better.
|
||||
- [peepdf](https://eternal-todo.com/tools/peepdf-pdf-analysis-tool) - Scriptable PDF file analyzer.
|
||||
- [PyREBox](https://talosintelligence.com/pyrebox) - Python-scriptable reverse engineering sandbox, based on QEMU.
|
||||
- [Watchtower](https://containrrr.dev/watchtower/) - Container-based solution for automating Docker container base image updates, providing an unattended upgrade experience.
|
||||
@@ -198,6 +200,7 @@ See also [Awesome-Fuzzing](https://github.com/secfigo/Awesome-Fuzzing).
|
||||
- [AllStar](https://github.com/ossf/allstar) - GitHub App installed on organizations or repositories to set and enforce security policies.
|
||||
- [Conftest](https://conftest.dev/) - Utility to help you write tests against structured configuration data.
|
||||
- [Open Policy Agent (OPA)](https://www.openpolicyagent.org/) - Unified toolset and framework for policy across the cloud native stack.
|
||||
- [Regula](https://regula.dev/) - Checks infrastructure as code templates (Terraform, CloudFormation, K8s manifests) for AWS, Azure, Google Cloud, and Kubernetes security and compliance using Open Policy Agent/Rego.
|
||||
- [Tang](https://github.com/latchset/tang) - Server for binding data to network presence; provides data to clients only when they are on a certain (secured) network.
|
||||
|
||||
### Supply chain security
|
||||
@@ -225,11 +228,13 @@ See also [awesome-honeypots](https://github.com/paralax/awesome-honeypots).
|
||||
## Host-based tools
|
||||
|
||||
- [Artillery](https://github.com/BinaryDefense/artillery) - Combination honeypot, filesystem monitor, and alerting system designed to protect Linux and Windows operating systems.
|
||||
- [chkrootkit](http://chkrootkit.org/) - Locally checks for signs of a rootkit on GNU/Linux systems.
|
||||
- [Crowd Inspect](https://www.crowdstrike.com/resources/community-tools/crowdinspect-tool/) - Free tool for Windows systems aimed to alert you to the presence of malware that may be communicating over the network.
|
||||
- [Fail2ban](https://www.fail2ban.org/) - Intrusion prevention software framework that protects computer servers from brute-force attacks.
|
||||
- [Open Source HIDS SECurity (OSSEC)](https://www.ossec.net/) - Fully open source and free, feature-rich, Host-based Instrusion Detection System (HIDS).
|
||||
- [Rootkit Hunter (rkhunter)](http://rkhunter.sourceforge.net/) - POSIX-compliant Bash script that scans a host for various signs of malware.
|
||||
- [Shufflecake](https://shufflecake.net/) - Plausible deniability for multiple hidden filesystems on Linux.
|
||||
- [USB Keystroke Injection Protection](https://github.com/google/ukip) - Daemon for blocking USB keystroke injection devices on Linux systems.
|
||||
- [chkrootkit](http://chkrootkit.org/) - Locally checks for signs of a rootkit on GNU/Linux systems.
|
||||
|
||||
### Sandboxes
|
||||
|
||||
@@ -266,6 +271,7 @@ See also [Security Orchestration, Automation, and Response (SOAR)](#security-orc
|
||||
- [OSXCollector](https://github.com/Yelp/osxcollector) - Forensic evidence collection & analysis toolkit for macOS.
|
||||
- [ir-rescue](https://github.com/diogo-fernan/ir-rescue) - Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
|
||||
- [Margarita Shotgun](https://github.com/ThreatResponse/margaritashotgun) - Command line utility (that works with or without Amazon EC2 instances) to parallelize remote memory acquisition.
|
||||
- [Untitled Goose Tool](https://github.com/cisagov/untitledgoosetool) - Assists incident response teams by exporting cloud artifacts from Azure/AzureAD/M365 environments in order to run a full investigation despite lacking in logs ingested by a SIEM.
|
||||
|
||||
## Network perimeter defenses
|
||||
|
||||
@@ -284,7 +290,8 @@ See also [Wikipedia: List of router and firewall distributions](https://en.wikip
|
||||
## Operating System distributions
|
||||
|
||||
- [Computer Aided Investigative Environment (CAINE)](https://caine-live.net/) - Italian GNU/Linux live distribution that pre-packages numerous digital forensics and evidence collection tools.
|
||||
- [Security Onion](https://securityonion.net/) - Free and open source GNU/Linux distribution for intrusion detection, enterprise security monitoring, and log management.
|
||||
- [FLARE VM](https://www.mandiant.com/resources/flare-vm-the-windows-malware) - Windows-based fully configured platform with a comprehensive collection of Windows security tools such as debuggers, disassemblers, decompilers, static and dynamic analysis utilities, network analysis and manipulation, web assessment, exploitation, vulnerability assessment applications, and many others.
|
||||
- [Security Onion](https://securityonionsolutions.com/) - Free and open source GNU/Linux distribution for intrusion detection, enterprise security monitoring, and log management.
|
||||
- [Qubes OS](https://qubes-os.org/) - Desktop environment built atop the Xen hypervisor project that runs each end-user program in its own virtual machine intended to provide strict security controls to constrain the reach of any successful malware exploit.
|
||||
|
||||
## Phishing awareness and reporting
|
||||
@@ -314,6 +321,12 @@ See also [awesome-pentest § Social Engineering Tools](https://github.com/fabaca
|
||||
- [Metta](https://github.com/uber-common/metta) - Automated information security preparedness tool to do adversarial simulation.
|
||||
- [Network Flight Simulator (`flightsim`)](https://github.com/alphasoc/flightsim) - Utility to generate malicious network traffic and help security teams evaluate security controls and audit their network visibility.
|
||||
- [RedHunt OS](https://github.com/redhuntlabs/RedHunt-OS) - Ubuntu-based Open Virtual Appliance (`.ova`) preconfigured with several threat emulation tools as well as a defender's toolkit.
|
||||
- [Stratus Red Team](https://stratus-red-team.cloud/) - Emulate offensive attack techniques in a granular and self-contained manner against a cloud environment; think "Atomic Red Team™ for the cloud."
|
||||
- [tcpreplay](https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic originally designed to replay malicious traffic patterns to Intrusion Detection/Prevention Systems.
|
||||
|
||||
### Post-engagement analysis and reporting
|
||||
|
||||
- [RedEye](https://cisagov.github.io/RedEye/) - Analytic tool to assist both Red and Blue teams with visualizing and reporting command and control activities, replay and demonstrate attack paths, and more clearly communicate remediation recommendations to stakeholders.
|
||||
|
||||
## Security configurations
|
||||
|
||||
@@ -323,7 +336,8 @@ See also [awesome-pentest § Social Engineering Tools](https://github.com/fabaca
|
||||
|
||||
## Security monitoring
|
||||
|
||||
* [Starbase](https://github.com/JupiterOne/starbase) - Collects assets and relationships from services and systems into an intuitive graph view to offer graph-based security analysis for everyone.
|
||||
- [Crossfeed](https://docs.crossfeed.cyber.dhs.gov/) - Continuously enumerates and monitors an organization’s public-facing attack surface in order to discover assets and flag potential security flaws.
|
||||
- [Starbase](https://github.com/JupiterOne/starbase) - Collects assets and relationships from services and systems into an intuitive graph view to offer graph-based security analysis for everyone.
|
||||
|
||||
### Endpoint Detection and Response (EDR)
|
||||
|
||||
@@ -333,9 +347,9 @@ See also [awesome-pentest § Social Engineering Tools](https://github.com/fabaca
|
||||
|
||||
See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools).
|
||||
|
||||
- [Arkime](https://github.com/arkime/arkime) - Augments your current security infrastructure to store and index network traffic in standard PCAP format, providing fast, indexed access.
|
||||
- [ChopShop](https://github.com/MITRECND/chopshop) - Framework to aid analysts in the creation and execution of pynids-based decoders and detectors of APT tradecraft.
|
||||
- [Maltrail](https://github.com/stamparm/maltrail) - Malicious network traffic detection system.
|
||||
- [Moloch](https://github.com/aol/moloch) - Augments your current security infrastructure to store and index network traffic in standard PCAP format, providing fast, indexed access.
|
||||
- [OwlH](https://www.owlh.net/) - Helps manage network IDS at scale by visualizing Suricata, Zeek, and Moloch life cycles.
|
||||
- [Real Intelligence Threat Analysis (RITA)](https://github.com/activecm/rita) - Open source framework for network traffic analysis that ingests Zeek logs and detects beaconing, DNS tunneling, and more.
|
||||
- [Respounder](https://github.com/codeexpress/respounder) - Detects the presence of the Responder LLMNR/NBT-NS/MDNS poisoner on a network.
|
||||
@@ -375,12 +389,13 @@ See also [awesome-threat-detection](https://github.com/0x4D31/awesome-threat-det
|
||||
- [DeepBlueCLI](https://github.com/sans-blue-team/DeepBlueCLI) - PowerShell module for hunt teaming via Windows Event logs.
|
||||
- [GRR Rapid Response](https://github.com/google/grr) - Incident response framework focused on remote live forensics consisting of a Python agent installed on assets and Python-based server infrastructure enabling analysts to quickly triage attacks and perform analysis remotely.
|
||||
- [Hunting ELK (HELK)](https://github.com/Cyb3rWard0g/HELK) - All-in-one Free Software threat hunting stack based on Elasticsearch, Logstash, Kafka, and Kibana with various built-in integrations for analytics including Jupyter Notebook.
|
||||
- [Logging Made Easy (LME)](https://www.cisa.gov/resources-tools/services/logging-made-easy) - Free and open logging and protective monitoring solution serving.
|
||||
- [MozDef](https://github.com/mozilla/MozDef) - Automate the security incident handling process and facilitate the real-time activities of incident handlers.
|
||||
- [PSHunt](https://github.com/Infocyte/PSHunt) - PowerShell module designed to scan remote endpoints for indicators of compromise or survey them for more comprehensive information related to state of those systems.
|
||||
- [PSRecon](https://github.com/gfoss/PSRecon) - PSHunt-like tool for analyzing remote Windows systems that also produces a self-contained HTML report of its findings.
|
||||
- [PowerForensics](https://github.com/Invoke-IR/PowerForensics) - All in one PowerShell-based platform to perform live hard disk forensic analysis.
|
||||
- [rastrea2r](https://github.com/rastrea2r/rastrea2r) - Multi-platform tool for triaging suspected IOCs on many endpoints simultaneously and that integrates with antivirus consoles.
|
||||
- [Redline](https://www.fireeye.com/services/freeware/redline.html) - Freeware endpoint auditing and analysis tool that provides host-based investigative capabilities, offered by FireEye, Inc.
|
||||
- [rastrea2r](https://github.com/rastrea2r/rastrea2r) - Multi-platform tool for triaging suspected IOCs on many endpoints simultaneously and that integrates with antivirus consoles.
|
||||
|
||||
## Threat intelligence
|
||||
|
||||
@@ -427,6 +442,8 @@ See also [awesome-tor](https://github.com/ajvb/awesome-tor).
|
||||
|
||||
### Overlay and Virtual Private Networks (VPNs)
|
||||
|
||||
- [Firezone](https://www.firezone.dev/) - Self-hosted VPN server built on WireGuard that supports MFA and SSO.
|
||||
- [Headscale](https://github.com/juanfont/headscale) - Open source, self-hosted implementation of the Tailscale control server.
|
||||
- [IPsec VPN Server Auto Setup Scripts](https://github.com/hwdsl2/setup-ipsec-vpn) - Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2.
|
||||
- [Innernet](https://github.com/tonarino/innernet) - Free Software private network system that uses WireGuard under the hood, made to be self-hosted.
|
||||
- [Nebula](https://github.com/slackhq/nebula) - Completely open source and self-hosted, scalable overlay networking tool with a focus on performance, simplicity, and security, inspired by tinc.
|
||||
|
||||
Reference in New Issue
Block a user