Track Awesome Cybersecurity Blueteam Updates Daily
:computer:🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
🏠 Home · 🔍 Search · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor · 😺 fabacab/awesome-cybersecurity-blueteam · ⭐ 4.1K · 🏷️ Security
Jul 07, 2024
Automation and Convention
- Password Manager Resources (⭐4.1k) - Collaborative, crowd-sourced data and code to make password management better.
Operating System distributions / Firewall appliances or distributions
- Security Onion - Free and open source GNU/Linux distribution for intrusion detection, enterprise security monitoring, and log management.
Nov 10, 2023
Security monitoring / Threat hunting
- Logging Made Easy (LME) - Free and open logging and protective monitoring solution serving.
Aug 18, 2023
Preparedness training and wargaming / Firewall appliances or distributions
- Stratus Red Team - Emulate offensive attack techniques in a granular and self-contained manner against a cloud environment; think "Atomic Red Team™ for the cloud."
Jul 19, 2023
Incident Response tools / Evidence collection
- Untitled Goose Tool (⭐899) - Assists incident response teams by exporting cloud artifacts from Azure/AzureAD/M365 environments in order to run a full investigation despite lacking in logs ingested by a SIEM.
Preparedness training and wargaming / Post-engagement analysis and reporting
- RedEye - Analytic tool to assist both Red and Blue teams with visualizing and reporting command and control activities, replay and demonstrate attack paths, and more clearly communicate remediation recommendations to stakeholders.
Security monitoring / Post-engagement analysis and reporting
- Crossfeed - Continuously enumerates and monitors an organization’s public-facing attack surface in order to discover assets and flag potential security flaws.
Mar 17, 2023
Host-based tools / Tarpits
- Shufflecake - Plausible deniability for multiple hidden filesystems on Linux.
Dec 22, 2022
Host-based tools / Tarpits
- USB Keystroke Injection Protection (⭐499) - Daemon for blocking USB keystroke injection devices on Linux systems.
Dec 16, 2022
Security monitoring / Network Security Monitoring (NSM)
- Arkime (⭐6.2k) - Augments your current security infrastructure to store and index network traffic in standard PCAP format, providing fast, indexed access.
Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)
- Firezone - Self-hosted VPN server built on WireGuard that supports MFA and SSO.
Sep 28, 2022
Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)
- Headscale (⭐21k) - Open source, self-hosted implementation of the Tailscale control server.
Sep 14, 2022
DevSecOps / Policy enforcement
- Regula - Checks infrastructure as code templates (Terraform, CloudFormation, K8s manifests) for AWS, Azure, Google Cloud, and Kubernetes security and compliance using Open Policy Agent/Rego.
Aug 11, 2022
Preparedness training and wargaming / Firewall appliances or distributions
- tcpreplay - Suite of free Open Source utilities for editing and replaying previously captured network traffic originally designed to replay malicious traffic patterns to Intrusion Detection/Prevention Systems.
May 16, 2022
DevSecOps / Service meshes
- Checkov - Static analysis for Terraform (infrastructure as code) to help detect CIS policy violations and prevent cloud security misconfiguration.
- terrascan - Static code analyzer for Infrastructure as Code tools that helps detect compliance and security violations to mitigate risk before provisioning cloud native resources.
- tfsec - Static analysis security scanner for your Terraform code designed to run locally and in CI pipelines.
May 09, 2022
DevSecOps / Dependency confusion
- snync (⭐36) - Prevent and detect if you're vulnerable to dependency confusion supply chain security attacks.
Threat intelligence / Fingerprinting
- HASSH (⭐531) - Network fingerprinting standard which can be used to identify specific client and server SSH implementations.
- JA3 - Extracts SSL/TLS handshake settings for fingerprinting and communicating about a given TLS implementation.
Mar 30, 2022
Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)
- OpenZITI - Open source initiative focused on bringing Zero Trust to any application via an overlay network, tunelling applications, and numerous SDKs.
Feb 26, 2022
Security monitoring / Post-engagement analysis and reporting
- Starbase (⭐333) - Collects assets and relationships from services and systems into an intuitive graph view to offer graph-based security analysis for everyone.
Feb 10, 2022
Cloud platform security / Kubernetes
- Sealed Secrets (⭐7.3k) - Kubernetes controller and tool for one-way encrypted Secrets.
Feb 05, 2022
Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)
- IPsec VPN Server Auto Setup Scripts (⭐24k) - Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2.
- Innernet (⭐4.9k) - Free Software private network system that uses WireGuard under the hood, made to be self-hosted.
- Nebula (⭐14k) - Completely open source and self-hosted, scalable overlay networking tool with a focus on performance, simplicity, and security, inspired by tinc.
- OpenVPN - Longstanding Free Software traditional SSL/TLS-based virtual private network.
- Tailscale - Managed freemium mesh VPN service built on top of WireGuard.
- tinc - Free Software mesh VPN implemented entirely in userspace that supports expandable network space, bridged ethernet segments, and more.
Jan 13, 2022
Preparedness training and wargaming / Firewall appliances or distributions
- Caldera - Scalable, automated, and extensible adversary emulation platform developed by MITRE.
Nov 28, 2021
Honeypots / Supply chain security
- Manuka (⭐321) - Open-sources intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.
Preparedness training and wargaming / Firewall appliances or distributions
- Infection Monkey - Open-source breach and attack simulation (BAS) platform that helps you validate existing controls and identify how attackers might exploit your current network security gaps.
Windows-based defenses / Overlay and Virtual Private Networks (VPNs)
- CobaltStrikeScan (⭐879) - Scan files or process memory for Cobalt Strike beacons and parse their configuration.
Nov 27, 2021
Windows-based defenses / Active Directory
- Active Directory Control Paths (⭐649) - Visualize and graph Active Directory permission configs ("control relations") to audit questions such as "Who can read the CEO's email?" and similar.
- PingCastle - Active Directory vulnerability detection and reporting tool.
- PlumHound (⭐1.1k) - More effectively use BloodHoundAD in continual security life-cycles by utilizing its pathfinding engine to identify Active Directory security vulnerabilities.
Nov 13, 2021
DevSecOps / Dependency confusion
- Dependency Combobulator (⭐85) - Open source, modular and extensible framework to detect and prevent dependency confusion leakage and potential attacks.
- Confusion checker (⭐60) - Script to check if you have artifacts containing the same name between your repositories.
Oct 28, 2021
Cloud platform security / Security Orchestration, Automation, and Response (SOAR)
- Aaia (⭐282) - Helps in visualizing AWS IAM and Organizations in a graph format with help of Neo4j.
- Principal Mapper (PMapper) (⭐1.4k) - Quickly evaluate IAM permissions in AWS via script and library capable of identifying risks in the configuration of AWS Identity and Access Management (IAM) for an AWS account or an AWS organization.
Oct 12, 2021
DevSecOps / Supply chain security
- in-toto - Framework to secure the integrity of software supply chains.
Sep 18, 2021
Identity and AuthN/AuthZ / Sandboxes
- Gluu Server - Central authentication and authorization for Web and mobile applications with a Free and Open Source Software cloud-native community distribution.
Aug 14, 2021
DevSecOps / Policy enforcement
- AllStar (⭐1.2k) - GitHub App installed on organizations or repositories to set and enforce security policies.
Aug 06, 2021
Transport-layer defenses / Overlay and Virtual Private Networks (VPNs)
- WireGuard - Extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography.
Aug 02, 2021
Preparedness training and wargaming / Firewall appliances or distributions
- Drool - Replay DNS traffic from packet capture files and send it to a specified server, such as for simulating DDoS attacks on the DNS and measuring normal DNS querying.
Jun 11, 2021
Threat intelligence / Threat hunting
- Threat Bus (⭐258) - Threat intelligence dissemination layer to connect security tools through a distributed publish/subscribe message broker.
May 22, 2021
DevSecOps / Policy enforcement
- Conftest - Utility to help you write tests against structured configuration data.
May 18, 2021
DevSecOps / Supply chain security
- Grafeas - Open artifact metadata API to audit and govern your software supply chain.
- Helm GPG (GnuPG) Plugin (⭐25) - Chart signing and verification with GnuPG for Helm.
- Notary (⭐3.2k) - Aims to make the internet more secure by making it easy for people to publish and verify content.
May 15, 2021
DevSecOps / Service meshes
- helm-secrets (⭐1.4k) - Helm plugin that helps manage secrets with Git workflow and stores them anywhere, backed by SOPS.
May 09, 2021
Communications security (COMSEC) / Service meshes
- Teleport - Allows engineers and security professionals to unify access for SSH servers, Kubernetes clusters, web applications, and databases across all environments.
May 04, 2021
Cloud platform security / Kubernetes
- Kyverno - Policy engine designed for Kubernetes.
- k-rail (⭐445) - Workload policy enforcement tool for Kubernetes.
- kubernetes-event-exporter (⭐1k) - Allows exporting the often missed Kubernetes events to various outputs so that they can be used for observability or alerting purposes.
Apr 26, 2021
DevSecOps / Policy enforcement
- Open Policy Agent (OPA) - Unified toolset and framework for policy across the cloud native stack.
Apr 11, 2021
Cloud platform security / Distributed monitoring
- Cortex - Provides horizontally scalable, highly available, multi-tenant, long term storage for Prometheus.
Apr 10, 2021
Cloud platform security / Distributed monitoring
- OpenTelemetry - Observability framework for cloud-native software, comprising a collection of tools, APIs, and SDKs for exporting application performance metrics to a tracing backend (formerly maintained by the OpenTracing and OpenCensus projects).
- Prometheus - Open-source systems monitoring and alerting toolkit originally built at SoundCloud.
Cloud platform security / Kubernetes
- certificate-expiry-monitor (⭐159) - Utility that exposes the expiry of TLS certificates as Prometheus metrics.
Apr 04, 2021
Network perimeter defenses / Firewall appliances or distributions
- IPFire - Hardened GNU/Linux based router and firewall distribution forked from IPCop.
- OPNsense - Hardened FreeBSD based firewall and routing platform forked from pfSense.
- pfSense - FreeBSD firewall and router distribution forked from m0n0wall.
Mar 29, 2021
Cloud platform security / Distributed monitoring
- Jaeger - Distributed tracing platform backend used for monitoring and troubleshooting microservices-based distributed systems.
- Zipkin - Distributed tracing system backend that helps gather timing data needed to troubleshoot latency problems in service architectures.
Cloud platform security / Kubernetes
- Linkerd - Ultra light Kubernetes-specific service mesh that adds observability, reliability, and security to Kubernetes applications without requiring any modification of the application itself.
Cloud platform security / Service meshes
- Consul - Solution to connect and configure applications across dynamic, distributed infrastructure and, with Consul Connect, enabling secure service-to-service communication with automatic TLS encryption and identity-based authorization.
- Istio - Open platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data.
Mar 27, 2021
Cloud platform security / Kubernetes
- kube-forensics (⭐212) - Allows a cluster administrator to dump the current state of a running pod and all its containers so that security professionals can perform off-line forensic analysis.
Communications security (COMSEC) / Service meshes
- GlobaLeaks - Free, open source software enabling anyone to easily set up and maintain a secure whistleblowing platform.
- SecureDrop - Open source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources.
Operating System distributions / Firewall appliances or distributions
- Qubes OS - Desktop environment built atop the Xen hypervisor project that runs each end-user program in its own virtual machine intended to provide strict security controls to constrain the reach of any successful malware exploit.
Mar 16, 2021
Host-based tools / Sandboxes
- Dangerzone - Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF.
Mar 14, 2021
Threat intelligence / Threat signature packages and collections
- ESET's Malware IoCs (⭐1.6k) - Indicators of Compromises (IOCs) derived from ESET's various investigations.
Mar 06, 2021
Host-based tools / Sandboxes
- Bubblewrap (⭐3.8k) - Sandboxing tool for use by unprivileged Linux users capable of restricting access to parts of the operating system or user data.
Feb 06, 2021
Cloud platform security / Kubernetes
- KubeSec - Static analyzer of Kubernetes manifests that can be run locally, as a Kuberenetes admission controller, or as its own cloud service.
- Managed Kubernetes Inspection Tool (MKIT) (⭐401) - Query and validate several common security-related configuration settings of managed Kubernetes cluster objects and the workloads/resources running inside the cluster.
- Polaris - Validates Kubernetes best practices by running tests against code commits, a Kubernetes admission request, or live resources already running in a cluster.
- kube-hunter - Open-source tool that runs a set of tests ("hunters") for security issues in Kubernetes clusters from either outside ("attacker's view") or inside a cluster.
Threat intelligence / Threat hunting
- Open Source Vulnerabilities (OSV) - Vulnerability database and triage infrastructure for open source projects aimed at helping both open source maintainers and consumers of open source.
Jan 01, 2021
Security configurations / Post-engagement analysis and reporting
- Bunkerized-nginx (⭐3.8k) - Docker image of an NginX configuration and scripts implementing many defensive techniques for Web sites.
Dec 14, 2020
Threat intelligence / Threat signature packages and collections
- FireEye's Sunburst Countermeasures (⭐560) - Collection of IoC in various languages for detecting backdoored SolarWinds Orion NMS activities and related vulnerabilities.
Dec 12, 2020
DevSecOps / Fuzzing
- Atheris - Coverage-guided Python fuzzing engine based off of libFuzzer that supports fuzzing of Python code but also native extensions written for CPython.
Dec 09, 2020
Threat intelligence / Threat signature packages and collections
- FireEye's Red Team Tool Countermeasures (⭐2.6k) - Collection of Snort and YARA rules to detect attacks carried out with FireEye's own Red Team tools, first released after FireEye disclosed a breach in December 2020.
- YARA Rules (⭐4k) - Project covering the need for IT security researchers to have a single repository where different Yara signatures are compiled, classified and kept as up to date as possible.
Dec 06, 2020
Preparedness training and wargaming / Firewall appliances or distributions
- BadBlood - Fills a test (non-production) Windows Domain with data that enables security analysts and engineers to practice using tools to gain an understanding and prescribe to securing Active Directory.
Threat intelligence / Threat hunting
- Sigma (⭐7.9k) - Generic signature format for SIEM systems, offering an open signature format that allows you to describe relevant log events in a straightforward manner.
- YARA (⭐7.9k) - Tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples, described as "the pattern matching swiss army knife" for file patterns and signatures.
Nov 13, 2020
macOS-based defenses / Overlay and Virtual Private Networks (VPNs)
- Santa (⭐4.4k) - Keep track of binaries that are naughty or nice in an allow/deny-listing system for macOS.
Oct 25, 2020
Automation and Convention
- PyREBox - Python-scriptable reverse engineering sandbox, based on QEMU.
Oct 11, 2020
Threat intelligence / Threat hunting
- DATA (⭐94) - Credential phish analysis and automation tool that can accept suspected phishing URLs directly or trigger on observed network traffic containing such a URL.
Sep 19, 2020
DevSecOps / Fuzzing
- OneFuzz (⭐2.8k) - Self-hosted Fuzzing-as-a-Service (FaaS) platform.
Sep 16, 2020
Automation and Convention
- Watchtower - Container-based solution for automating Docker container base image updates, providing an unattended upgrade experience.
Aug 14, 2020
DevSecOps / Service meshes
- Bane (⭐1.2k) - Custom and better AppArmor profile generator for Docker containers.
- Trivy (⭐22k) - Simple and comprehensive vulnerability scanner for containers and other artifacts, suitable for use in continuous integration pipelines.
Aug 13, 2020
Communications security (COMSEC) / Service meshes
- Geneva (Genetic Evasion) - Novel experimental genetic algorithm that evolves packet-manipulation-based censorship evasion strategies against nation-state level censors to increase availability of otherwise blocked content.
Aug 11, 2020
DevSecOps / Compliance testing and reporting
- Chef InSpec - Language for describing security and compliance rules, which become automated tests that can be run against IT infrastructures to discover and report on non-compliance.
- OpenSCAP Base - Both a library and a command line tool (
oscap
) used to evaluate a system against SCAP baseline profiles to report on the security posture of the scanned system(s).
Jul 28, 2020
DevSecOps / Application or Binary Hardening
- DynInst - Tools for binary instrumentation, analysis, and modification, useful for binary patching.
- DynamoRIO - Runtime code manipulation system that supports code transformations on any part of a program, while it executes, implemented as a process-level virtual machine.
- Valgrind - Instrumentation framework for building dynamic analysis tools.
Jul 15, 2020
Cloud platform security / Security Orchestration, Automation, and Response (SOAR)
- Kata Containers - Secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense.
- gVisor (⭐15k) - Application kernel, written in Go, that implements a substantial portion of the Linux system surface to provide an isolation boundary between the application and the host kernel.
Security monitoring / Network Security Monitoring (NSM)
- Respounder (⭐312) - Detects the presence of the Responder LLMNR/NBT-NS/MDNS poisoner on a network.
- Tsunami (⭐8.2k) - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
Jul 14, 2020
DevSecOps / Service meshes
- SOPS (⭐16k) - Editor of encrypted files that supports YAML, JSON, ENV, INI and binary formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, and PGP.
- Vault - Tool for securely accessing secrets such as API keys, passwords, or certificates through a unified interface.
- git-crypt - Transparent file encryption in git; files which you choose to protect are encrypted when committed, and decrypted when checked out.
Jun 24, 2020
Network perimeter defenses / Evidence collection
- Gatekeeper (⭐1.3k) - First open source Distributed Denial of Service (DDoS) protection system.
Jun 21, 2020
Incident Response tools / Sandboxes
- LogonTracer (⭐2.7k) - Investigate malicious Windows logon by visualizing and analyzing Windows event log.
- Volatility - Advanced memory forensics framework.
Security monitoring / Network Security Monitoring (NSM)
- Real Intelligence Threat Analysis (RITA) (⭐7) - Open source framework for network traffic analysis that ingests Zeek logs and detects beaconing, DNS tunneling, and more.
Jun 18, 2020
Automation and Convention
- Dev-Sec.io - Server hardening framework providing Ansible, Chef, and Puppet implementations of various baseline security configurations.
- peepdf - Scriptable PDF file analyzer.
Automation and Convention / Security Orchestration, Automation, and Response (SOAR)
- Shuffle - Graphical generalized workflow (automation) builder for IT professionals and blue teamers.
Jun 08, 2020
Security monitoring / Network Security Monitoring (NSM)
- Stenographer (⭐1.8k) - Full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes.
Security monitoring / Service and performance monitoring
- Zabbix - Mature, enterprise-level platform to monitor large-scale IT environments.
May 29, 2020
Cloud platform security / Security Orchestration, Automation, and Response (SOAR)
- Falco - Behavioral activity monitor designed to detect anomalous activity in containerized applications, hosts, and network packet flows by auditing the Linux kernel and enriched by runtime data such as Kubernetes metrics.
May 11, 2020
macOS-based defenses / Overlay and Virtual Private Networks (VPNs)
- BlockBlock - Monitors common persistence locations and alerts whenever a persistent component is added, which helps to detect and prevent malware installation.
Apr 23, 2020
Windows-based defenses / Overlay and Virtual Private Networks (VPNs)
- Sandboxie - Free and open source general purpose Windows application sandboxing utility.
Apr 19, 2020
DevSecOps / Service meshes
- DefectDojo - Application vulnerability management tool built for DevOps and continuous security integration.
DevSecOps / Fuzzing
- FuzzBench - Free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale.
Apr 15, 2020
Threat intelligence / Threat hunting
- AttackerKB - Free and public crowdsourced vulnerability assessment platform to help prioritize high-risk patch application and combat vulnerability fatigue.
Apr 06, 2020
DevSecOps / Service meshes
- CodeQL - Discover vulnerabilities across a codebase by performing queries against code as though it were data.
Apr 02, 2020
Security monitoring / Network Security Monitoring (NSM)
- VAST (⭐622) - Free and open-source network telemetry engine for data-driven security investigations.
- Zeek - Powerful network analysis framework focused on security monitoring, formerly known as Bro.
Mar 26, 2020
Host-based tools / Tarpits
- Crowd Inspect - Free tool for Windows systems aimed to alert you to the presence of malware that may be communicating over the network.
Security monitoring / Endpoint Detection and Response (EDR)
- Wazuh - Open source, multiplatform agent-based security monitoring based on a fork of OSSEC HIDS.
Security monitoring / Network Security Monitoring (NSM)
- ChopShop (⭐487) - Framework to aid analysts in the creation and execution of pynids-based decoders and detectors of APT tradecraft.
- Maltrail (⭐5.9k) - Malicious network traffic detection system.
- OwlH - Helps manage network IDS at scale by visualizing Suricata, Zeek, and Moloch life cycles.
- Snort - Widely-deployed, Free Software IPS capable of real-time packet analysis, traffic logging, and custom rule-based triggers.
- SpoofSpotter (⭐48) - Catch spoofed NetBIOS Name Service (NBNS) responses and alert to an email or log file.
- Suricata - Free, cross-platform, IDS/IPS with on- and off-line analysis modes and deep packet inspection capabilities that is also scriptable with Lua.
- Wireshark - Free and open-source packet analyzer useful for network troubleshooting or forensic netflow analysis.
- netsniff-ng - Free and fast GNU/Linux networking toolkit with numerous utilities such as a connection tracking tool (
flowtop
), traffic generator (trafgen
), and autonomous system (AS) trace route utility (astraceroute
).
Security monitoring / Threat hunting
- CimSweep (⭐636) - Suite of CIM/WMI-based tools enabling remote incident response and hunting operations across all versions of Windows.
- DeepBlueCLI (⭐2.1k) - PowerShell module for hunt teaming via Windows Event logs.
- GRR Rapid Response (⭐4.7k) - Incident response framework focused on remote live forensics consisting of a Python agent installed on assets and Python-based server infrastructure enabling analysts to quickly triage attacks and perform analysis remotely.
- Hunting ELK (HELK) (⭐3.7k) - All-in-one Free Software threat hunting stack based on Elasticsearch, Logstash, Kafka, and Kibana with various built-in integrations for analytics including Jupyter Notebook.
- MozDef (⭐2.2k) - Automate the security incident handling process and facilitate the real-time activities of incident handlers.
- PSHunt (⭐276) - PowerShell module designed to scan remote endpoints for indicators of compromise or survey them for more comprehensive information related to state of those systems.
- PSRecon (⭐474) - PSHunt-like tool for analyzing remote Windows systems that also produces a self-contained HTML report of its findings.
- PowerForensics (⭐1.4k) - All in one PowerShell-based platform to perform live hard disk forensic analysis.
- Redline - Freeware endpoint auditing and analysis tool that provides host-based investigative capabilities, offered by FireEye, Inc.
- rastrea2r (⭐235) - Multi-platform tool for triaging suspected IOCs on many endpoints simultaneously and that integrates with antivirus consoles.
Mar 16, 2020
Automation and Convention
- Clevis (⭐836) - Plugable framework for automated decryption, often used as a Tang client.
DevSecOps / Policy enforcement
- Tang (⭐474) - Server for binding data to network presence; provides data to clients only when they are on a certain (secured) network.
Feb 26, 2020
DevSecOps / Service meshes
- Snyk - Finds and fixes vulnerabilities and license violations in open source dependencies and container images.
Feb 18, 2020
DevSecOps / Application or Binary Hardening
- Egalito - Binary recompiler and instrumentation framework that can fully disassemble, transform, and regenerate ordinary Linux binaries designed for binary hardening and security research.
Feb 10, 2020
Network perimeter defenses / Evidence collection
- ssh-audit (⭐3.2k) - Simple tool that makes quick recommendations for improving an SSH server's security posture.
Nov 21, 2019
Honeypots / Supply chain security
- Kushtaka - Sustainable all-in-one honeypot and honeytoken orchestrator for under-resourced blue teams.
Nov 06, 2019
Phishing awareness and reporting / Firewall appliances or distributions
- mailspoof (⭐113) - Scans SPF and DMARC records for issues that could allow email spoofing.
Nov 05, 2019
Cloud platform security / Security Orchestration, Automation, and Response (SOAR)
- Prowler (⭐10k) - Tool based on AWS-CLI commands for Amazon Web Services account security assessment and hardening.
- Scout Suite (⭐6.3k) - Open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments.
Phishing awareness and reporting / Firewall appliances or distributions
- CertSpotter (⭐943) - Certificate Transparency log monitor from SSLMate that alerts you when a SSL/TLS certificate is issued for one of your domains.
Nov 04, 2019
Phishing awareness and reporting / Firewall appliances or distributions
- phishing_catcher (⭐1.7k) - Configurable script to watch for issuances of suspicious TLS certificates by domain name in the Certificate Transparency Log (CTL) using the CertStream service.
Sep 24, 2019
Phishing awareness and reporting / Firewall appliances or distributions
- Phishing Intelligence Engine (PIE) (⭐179) - Framework that will assist with the detection and response to phishing attacks.
Aug 06, 2019
Automation and Convention
- Ansible Lockdown - Curated collection of information security themed Ansible roles that are both vetted and actively maintained.
Aug 05, 2019
Automation and Convention / Code libraries and bindings
- MultiScanner (⭐615) - File analysis framework written in Python that assists in evaluating a set of files by automatically running a suite of tools against them and aggregating the output.
- libcrafter (⭐296) - High level C++ network packet sniffing and crafting library.
Security monitoring / Service and performance monitoring
- Locust - Open source load testing tool in which you can define user behaviour with Python code and swarm your system with millions of simultaneous users.
Jul 29, 2019
macOS-based defenses / Overlay and Virtual Private Networks (VPNs)
- LuLu - Free macOS firewall.
- Stronghold (⭐1.1k) - Easily configure macOS security settings from the terminal.
- macOS Fortress (⭐407) - Automated configuration of kernel-level, OS-level, and client-level security features including privatizing proxying and anti-virus scanning for macOS.
Jul 27, 2019
Phishing awareness and reporting / Firewall appliances or distributions
- Gophish - Powerful, open-source phishing framework that makes it easy to test your organization's exposure to phishing.
- King Phisher (⭐2.2k) - Tool for testing and promoting user awareness by simulating real world phishing attacks.
- NotifySecurity (⭐127) - Outlook add-in used to help your users to report suspicious e-mails to security teams.
- Swordphish (⭐216) - Platform allowing to create and manage (fake) phishing campaigns intended to train people in identifying suspicious mails.
Jul 13, 2019
Incident Response tools / IR management consoles
- Rekall - Advanced forensic and incident response framework.
Jul 11, 2019
Automation and Convention
- DShell (⭐5.4k) - Extensible network forensic analysis framework written in Python that enables rapid development of plugins to support the dissection of network packet captures.
Jun 13, 2019
Host-based tools / Tarpits
- chkrootkit - Locally checks for signs of a rootkit on GNU/Linux systems.
Host-based tools / Sandboxes
- Firejail - SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf.
Jun 06, 2019
Incident Response tools / Evidence collection
- AutoMacTC (⭐515) - Modular, automated forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and present them in formats viable for analysis.
May 05, 2019
DevSecOps / Service meshes
- Cilium - Open source software for transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes.
Mar 31, 2019
Honeypots / Tarpits
- Endlessh (⭐7k) - SSH tarpit that slowly sends an endless banner.
- LaBrea - Program that answers ARP requests for unused IP space, creating the appearance of fake machines that answer further requests very slowly in order to slow down scanners, worms, etcetera.
Mar 19, 2019
Transport-layer defenses / Threat signature packages and collections
- MITMEngine (⭐799) - Golang library for server-side detection of TLS interception events.
Mar 16, 2019
Automation and Convention / Code libraries and bindings
- censys-python (⭐380) - Python wrapper to the Censys REST API.
Mar 11, 2019
Windows-based defenses / Overlay and Virtual Private Networks (VPNs)
- Sigcheck - Audit a Windows host's root certificate store against Microsoft's Certificate Trust List (CTL).
Mar 08, 2019
Communications security (COMSEC) / Service meshes
- GPG Sync (⭐344) - Centralize and automate OpenPGP public key distribution, revocation, and updates amongst all members of an organization or team.
Feb 26, 2019
Host-based tools / Tarpits
- Rootkit Hunter (rkhunter) - POSIX-compliant Bash script that scans a host for various signs of malware.
Jan 01, 2019
DevSecOps / Service meshes
- Clair (⭐10k) - Static analysis tool to probe for vulnerabilities introduced via application container (e.g., Docker) images.
- Gauntlt - Pentest applications during routine continuous integration build pipelines.
- SonarQube - Continuous inspection tool that provides detailed reports during automated testing and alerts on newly introduced security vulnerabilities.
Transport-layer defenses / Threat signature packages and collections
- Tor - Censorship circumvention and anonymizing overlay network providing distributed, cryptographically verified name services (
.onion
domains) to enhance publisher privacy and service availability.
Nov 16, 2018
DevSecOps / Service meshes
- BlackBox (⭐6.6k) - Safely store secrets in Git/Mercurial/Subversion by encrypting them "at rest" using GnuPG.
Aug 29, 2018
Automation and Convention / Code libraries and bindings
- python-dshield (⭐24) - Pythonic interface to the Internet Storm Center/DShield API.
- python-sandboxapi (⭐132) - Minimal, consistent Python API for building integrations with malware sandboxes.
- python-stix2 (⭐356) - Python APIs for serializing and de-serializing Structured Threat Information eXpression (STIX) JSON content, plus higher-level APIs for common tasks.
Threat intelligence / Threat hunting
- ThreatIngestor (⭐801) - Extendable tool to extract and aggregate IOCs from threat feeds including Twitter, RSS feeds, or other sources.
Aug 22, 2018
Incident Response tools / Sandboxes
- aws_ir (⭐339) - Automates your incident response with zero security preparedness assumptions.
Incident Response tools / Evidence collection
- Margarita Shotgun (⭐236) - Command line utility (that works with or without Amazon EC2 instances) to parallelize remote memory acquisition.
Aug 21, 2018
DevSecOps / Service meshes
- Git Secrets (⭐12k) - Prevents you from committing passwords and other sensitive information to a git repository.
Aug 10, 2018
Host-based tools / Tarpits
- Open Source HIDS SECurity (OSSEC) - Fully open source and free, feature-rich, Host-based Instrusion Detection System (HIDS).
Aug 06, 2018
Host-based tools / Tarpits
- Fail2ban - Intrusion prevention software framework that protects computer servers from brute-force attacks.
Incident Response tools / IR management consoles
- Fast Incident Response (FIR) (⭐1.7k) - Cybersecurity incident management platform allowing for easy creation, tracking, and reporting of cybersecurity incidents.
- TheHive - Scalable, free Security Incident Response Platform designed to make life easier for SOCs, CSIRTs, and CERTs, featuring tight integration with MISP.
- threat_note (⭐422) - Web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related to their research.
Incident Response tools / Evidence collection
- OSXAuditor (⭐3.1k) - Free macOS computer forensics tool.
- OSXCollector (⭐1.9k) - Forensic evidence collection & analysis toolkit for macOS.
- ir-rescue (⭐456) - Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Operating System distributions / Firewall appliances or distributions
- Computer Aided Investigative Environment (CAINE) - Italian GNU/Linux live distribution that pre-packages numerous digital forensics and evidence collection tools.
Preparedness training and wargaming / Firewall appliances or distributions
- APTSimulator (⭐2.4k) - Toolset to make a system look as if it was the victim of an APT attack.
- Atomic Red Team - Library of simple, automatable tests to execute for testing security controls.
- Metta (⭐1.1k) - Automated information security preparedness tool to do adversarial simulation.
- Network Flight Simulator (
flightsim
) (⭐1.2k) - Utility to generate malicious network traffic and help security teams evaluate security controls and audit their network visibility.
- RedHunt OS (⭐1.2k) - Ubuntu-based Open Virtual Appliance (
.ova
) preconfigured with several threat emulation tools as well as a defender's toolkit.
Threat intelligence / Threat hunting
- MLSec Combine (⭐650) - Gather and combine multiple threat intelligence feed sources into one customizable, standardized CSV-based format.
Transport-layer defenses / Threat signature packages and collections
- Certbot - Free tool to automate the issuance and renewal of TLS certificates from the LetsEncrypt Root CA with plugins that configure various Web and e-mail server software.
Windows-based defenses / Overlay and Virtual Private Networks (VPNs)
- Sticky Keys Slayer (⭐324) - Establishes a Windows RDP session from a list of hostnames and scans for accessibility tools backdoors, alerting if one is discovered.
- Windows Secure Host Baseline (⭐1.5k) - Group Policy objects, compliance checks, and configuration tools that provide an automated and flexible approach for securely deploying and maintaining the latest releases of Windows 10.
Aug 05, 2018
Automation and Convention / Code libraries and bindings
- Posh-VirusTotal (⭐113) - PowerShell interface to VirusTotal.com APIs.
Incident Response tools / IR management consoles
- CIRTKit (⭐141) - Scriptable Digital Forensics and Incident Response (DFIR) toolkit built on Viper.
Security monitoring / Service and performance monitoring
- osquery (⭐22k) - Operating system instrumentation framework for macOS, Windows, and Linux, exposing the OS as a high-performance relational database that can be queried with a SQL-like syntax.
Threat intelligence / Threat hunting
- Forager (⭐167) - Multi-threaded threat intelligence gathering built with Python3 featuring simple text-based configuration and data storage for ease of use and data portability.
- Malware Information Sharing Platform and Threat Sharing (MISP) - Open source software solution for collecting, storing, distributing and sharing cyber security indicators.
- Viper (⭐1.5k) - Binary analysis and management framework enabling easy organization of malware and exploit samples.
Windows-based defenses / Overlay and Virtual Private Networks (VPNs)
- HardenTools (⭐2.9k) - Utility that disables a number of risky Windows features.
- WMI Monitor (⭐122) - Log newly created WMI consumers and processes to the Windows Application event log.
Jul 31, 2018
Honeypots / Supply chain security
- CanaryTokens (⭐1.7k) - Self-hostable honeytoken generator and reporting dashboard; demo version available at CanaryTokens.org.
Host-based tools / Tarpits
- Artillery (⭐991) - Combination honeypot, filesystem monitor, and alerting system designed to protect Linux and Windows operating systems.
Preparedness training and wargaming / Firewall appliances or distributions
- DumpsterFire (⭐976) - Modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events for Blue Team drills and sensor/alert mapping.
Tor Onion service defenses / Threat signature packages and collections
- OnionBalance - Provides load-balancing while also making Onion services more resilient and reliable by eliminating single points-of-failure.
- Vanguards (⭐197) - Version 3 Onion service guard discovery attack mitigation script (intended for eventual inclusion in Tor core).
Windows-based defenses / Overlay and Virtual Private Networks (VPNs)
- NotRuler (⭐91) - Detect both client-side rules and VBScript enabled forms used by the Ruler (⭐2.1k) attack tool when attempting to compromise a Microsoft Exchange server.
Jul 27, 2018
Threat intelligence / Threat hunting
- Unfetter - Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework.
Jul 26, 2018
Threat intelligence / Threat hunting
- GRASSMARLIN (⭐911) - Provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) by passively mapping, accounting for, and reporting on your ICS/SCADA network topology and endpoints.
Jul 25, 2018
Security monitoring / Service and performance monitoring
- Icinga - Modular redesign of Nagios with pluggable user interfaces and an expanded set of data connectors, collectors, and reporting tools.
- Nagios - Popular network and service monitoring solution and reporting platform.
- OpenNMS - Free and feature-rich networking monitoring system supporting multiple configurations, a variety of alerting mechanisms (email, XMPP, SMS), and numerous data collection methods (SNMP, HTTP, JDBC, etc).
Jul 23, 2018
Network perimeter defenses / Evidence collection
- fwknop - Protects ports via Single Packet Authorization in your firewall.
Security monitoring / Security Information and Event Management (SIEM)
- AlienVault OSSIM - Single-server open source SIEM platform featuring asset discovery, asset inventorying, behavioral monitoring, and event correlation, driven by AlienVault Open Threat Exchange (OTX).
- Prelude SIEM OSS - Open source, agentless SIEM with a long history and several commercial variants featuring security event collection, normalization, and alerting from arbitrary log input and numerous popular monitoring tools.