Update render script and Makefile

This commit is contained in:
Jonas Zeunert
2024-04-22 21:54:39 +02:00
parent 2d63fe63cd
commit 4d0cd768f7
10975 changed files with 47095 additions and 4031084 deletions

View File

@@ -1,22 +1,24 @@
 Awesome Cybersecurity Blue Team !Awesome (https://awesome.re/badge-flat2.svg) (https://awesome.re)
 Awesome Cybersecurity Blue Team !Awesome (https://awesome.re/badge-flat2.svg) (https://awesome.re)
▐ A collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Cybersecurity blue teams (https://en.wikipedia.org/wiki/Blue_team_(computer_security)) are groups of individuals who identify security flaws in information technology systems, verify the effectiveness of 
security measures, and monitor the systems to ensure that implemented defensive measures remain effective in the future. While not exclusive, this list is heavily biased towards Free Software 
(https://www.gnu.org/philosophy/free-sw.html) projects and against proprietary products or corporate services. For offensive TTPs, please see awesome-pentest (https://github.com/fabacab/awesome-pentest).
Cybersecurity blue teams (https://en.wikipedia.org/wiki/Blue_team_(computer_security)) are groups of individuals who identify security flaws in information technology systems, verify the 
effectiveness of security measures, and monitor the systems to ensure that implemented defensive measures remain effective in the future. While not exclusive, this list is heavily biased 
towards Free Software (https://www.gnu.org/philosophy/free-sw.html) projects and against proprietary products or corporate services. For offensive TTPs, please see awesome-pentest 
(https://github.com/fabacab/awesome-pentest).
Your contributions and suggestions are heartily ♥ welcome. (✿◕‿◕). Please check the Contributing Guidelines (CONTRIBUTING.md) for more details. This work is licensed under a Creative Commons Attribution 4.0 
International License (http://creativecommons.org/licenses/by/4.0/).
Your contributions and suggestions are heartily ♥ welcome. (✿◕‿◕). Please check the Contributing Guidelines (CONTRIBUTING.md) for more details. This work is licensed under a Creative Commons 
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).
Many cybersecurity professionals enable racist state violence, wittingly or unwittingly, by providing services to local, state, and federal policing agencies or otherwise cooperating with similar institutions 
who do so. This evil most often happens through the coercive mechanism of employment under threat of lack of access to food, shelter, or healthcare. Despite this list's public availability, it is the 
maintainer's intention and hope that this list supports the people and organizations who work to counter such massive albeit banal evil.
Many cybersecurity professionals enable racist state violence, wittingly or unwittingly, by providing services to local, state, and federal policing agencies or otherwise cooperating with 
similar institutions who do so. This evil most often happens through the coercive mechanism of employment under threat of lack of access to food, shelter, or healthcare. Despite this list's 
public availability, it is the maintainer's intention and hope that this list supports the people and organizations who work to counter such massive albeit banal evil.
!Image of a raised fist composed of the names of Black people murdered by taxpayer-funded racist police violence. 
(https://web.archive.org/web/20201028021653if_/https://lauerrealtygroup.com/wp-content/uploads/2020/06/BLM-FIST-scaled.jpg)
!Image of a "Blue Lives Matter" flag with the thin blue line being peeled away to reveal a Nazi swastika underneath. (https://web.archive.org/web/20201123181815if_/https://i.redd.it/86pl28p0dl631.jpg)
!Image of a "Blue Lives Matter" flag with the thin blue line being peeled away to reveal a Nazi swastika underneath. 
(https://web.archive.org/web/20201123181815if_/https://i.redd.it/86pl28p0dl631.jpg)
DEFUND THE POLICE. (https://defundthepolice.org/)
@@ -72,8 +74,8 @@
- Ansible Lockdown (https://ansiblelockdown.io/) - Curated collection of information security themed Ansible roles that are both vetted and actively maintained.
- Clevis (https://github.com/latchset/clevis) - Plugable framework for automated decryption, often used as a Tang client.
- DShell (https://github.com/USArmyResearchLab/Dshell) - Extensible network forensic analysis framework written in Python that enables rapid development of plugins to support the dissection of network packet 
captures.
- DShell (https://github.com/USArmyResearchLab/Dshell) - Extensible network forensic analysis framework written in Python that enables rapid development of plugins to support the dissection 
of network packet captures.
- Dev-Sec.io (https://dev-sec.io/) - Server hardening framework providing Ansible, Chef, and Puppet implementations of various baseline security configurations.
- peepdf (https://eternal-todo.com/tools/peepdf-pdf-analysis-tool) - Scriptable PDF file analyzer.
- PyREBox (https://talosintelligence.com/pyrebox) - Python-scriptable reverse engineering sandbox, based on QEMU.
@@ -81,15 +83,15 @@
Code libraries and bindings
- MultiScanner (https://github.com/mitre/multiscanner) - File analysis framework written in Python that assists in evaluating a set of files by automatically running a suite of tools against them and aggregating
the output.
- MultiScanner (https://github.com/mitre/multiscanner) - File analysis framework written in Python that assists in evaluating a set of files by automatically running a suite of tools against 
them and aggregating the output.
- Posh-VirusTotal (https://github.com/darkoperator/Posh-VirusTotal) - PowerShell interface to VirusTotal.com APIs.
- censys-python (https://github.com/censys/censys-python) - Python wrapper to the Censys REST API.
- libcrafter (https://github.com/pellegre/libcrafter) - High level C++ network packet sniffing and crafting library.
- python-dshield (https://github.com/rshipp/python-dshield) - Pythonic interface to the Internet Storm Center/DShield API.
- python-sandboxapi (https://github.com/InQuest/python-sandboxapi) - Minimal, consistent Python API for building integrations with malware sandboxes.
- python-stix2 (https://github.com/oasis-open/cti-python-stix2) - Python APIs for serializing and de-serializing Structured Threat Information eXpression (STIX) JSON content, plus higher-level APIs for common 
tasks.
- python-stix2 (https://github.com/oasis-open/cti-python-stix2) - Python APIs for serializing and de-serializing Structured Threat Information eXpression (STIX) JSON content, plus 
higher-level APIs for common tasks.
Security Orchestration, Automation, and Response (SOAR)
@@ -102,16 +104,16 @@
See also asecure.cloud/tools (https://asecure.cloud/tools/).
- Aaia (https://github.com/rams3sh/Aaia) - Helps in visualizing AWS IAM and Organizations in a graph format with help of Neo4j.
- Falco (https://falco.org/) - Behavioral activity monitor designed to detect anomalous activity in containerized applications, hosts, and network packet flows by auditing the Linux kernel and enriched by 
runtime data such as Kubernetes metrics.
- Kata Containers (https://katacontainers.io/) - Secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware 
virtualization technology as a second layer of defense.
- Principal Mapper (PMapper) (https://github.com/nccgroup/PMapper) - Quickly evaluate IAM permissions in AWS via script and library capable of identifying risks in the configuration of AWS Identity and Access 
Management (IAM) for an AWS account or an AWS organization.
- Falco (https://falco.org/) - Behavioral activity monitor designed to detect anomalous activity in containerized applications, hosts, and network packet flows by auditing the Linux kernel 
and enriched by runtime data such as Kubernetes metrics.
- Kata Containers (https://katacontainers.io/) - Secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation 
using hardware virtualization technology as a second layer of defense.
- Principal Mapper (PMapper) (https://github.com/nccgroup/PMapper) - Quickly evaluate IAM permissions in AWS via script and library capable of identifying risks in the configuration of AWS 
Identity and Access Management (IAM) for an AWS account or an AWS organization.
- Prowler (https://github.com/toniblyx/prowler) - Tool based on AWS-CLI commands for Amazon Web Services account security assessment and hardening.
- Scout Suite (https://github.com/nccgroup/ScoutSuite) - Open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments.
- gVisor (https://github.com/google/gvisor) - Application kernel, written in Go, that implements a substantial portion of the Linux system surface to provide an isolation boundary between the application and the
host kernel.
- gVisor (https://github.com/google/gvisor) - Application kernel, written in Go, that implements a substantial portion of the Linux system surface to provide an isolation boundary between the
application and the host kernel.
Distributed monitoring
@@ -119,8 +121,8 @@
- Cortex (https://cortexmetrics.io/) - Provides horizontally scalable, highly available, multi-tenant, long term storage for Prometheus.
- Jaeger (https://www.jaegertracing.io/) - Distributed tracing platform backend used for monitoring and troubleshooting microservices-based distributed systems.
- OpenTelemetry (https://opentelemetry.io/) - Observability framework for cloud-native software, comprising a collection of tools, APIs, and SDKs for exporting application performance metrics to a tracing 
backend (formerly maintained by the OpenTracing and OpenCensus projects).
- OpenTelemetry (https://opentelemetry.io/) - Observability framework for cloud-native software, comprising a collection of tools, APIs, and SDKs for exporting application performance metrics
to a tracing backend (formerly maintained by the OpenTracing and OpenCensus projects).
- Prometheus (https://prometheus.io/) - Open-source systems monitoring and alerting toolkit originally built at SoundCloud.
- Zipkin (https://zipkin.io/) - Distributed tracing system backend that helps gather timing data needed to troubleshoot latency problems in service architectures.
@@ -130,26 +132,28 @@
- KubeSec (https://kubesec.io/) - Static analyzer of Kubernetes manifests that can be run locally, as a Kuberenetes admission controller, or as its own cloud service.
- Kyverno (https://kyverno.io/) - Policy engine designed for Kubernetes.
- Linkerd (https://linkerd.io/) - Ultra light Kubernetes-specific service mesh that adds observability, reliability, and security to Kubernetes applications without requiring any modification of the application 
itself.
- Managed Kubernetes Inspection Tool (MKIT) (https://github.com/darkbitio/mkit) - Query and validate several common security-related configuration settings of managed Kubernetes cluster objects and the 
workloads/resources running inside the cluster.
- Polaris (https://polaris.docs.fairwinds.com/) - Validates Kubernetes best practices by running tests against code commits, a Kubernetes admission request, or live resources already running in a cluster. 
- Linkerd (https://linkerd.io/) - Ultra light Kubernetes-specific service mesh that adds observability, reliability, and security to Kubernetes applications without requiring any modification
of the application itself.
- Managed Kubernetes Inspection Tool (MKIT) (https://github.com/darkbitio/mkit) - Query and validate several common security-related configuration settings of managed Kubernetes cluster 
objects and the workloads/resources running inside the cluster.
- Polaris (https://polaris.docs.fairwinds.com/) - Validates Kubernetes best practices by running tests against code commits, a Kubernetes admission request, or live resources already running 
in a cluster. 
- Sealed Secrets (https://github.com/bitnami-labs/sealed-secrets) - Kubernetes controller and tool for one-way encrypted Secrets.
- certificate-expiry-monitor (https://github.com/muxinc/certificate-expiry-monitor) - Utility that exposes the expiry of TLS certificates as Prometheus metrics.
- k-rail (https://github.com/cruise-automation/k-rail) - Workload policy enforcement tool for Kubernetes.
- kube-forensics (https://github.com/keikoproj/kube-forensics) - Allows a cluster administrator to dump the current state of a running pod and all its containers so that security professionals can perform 
off-line forensic analysis.
- kube-hunter (https://kube-hunter.aquasec.com/) - Open-source tool that runs a set of tests ("hunters") for security issues in Kubernetes clusters from either outside ("attacker's view") or inside a cluster.
- kubernetes-event-exporter (https://github.com/opsgenie/kubernetes-event-exporter) - Allows exporting the often missed Kubernetes events to various outputs so that they can be used for observability or alerting
purposes.
- kube-forensics (https://github.com/keikoproj/kube-forensics) - Allows a cluster administrator to dump the current state of a running pod and all its containers so that security 
professionals can perform off-line forensic analysis.
- kube-hunter (https://kube-hunter.aquasec.com/) - Open-source tool that runs a set of tests ("hunters") for security issues in Kubernetes clusters from either outside ("attacker's view") or 
inside a cluster.
- kubernetes-event-exporter (https://github.com/opsgenie/kubernetes-event-exporter) - Allows exporting the often missed Kubernetes events to various outputs so that they can be used for 
observability or alerting purposes.
Service meshes
See also ServiceMesh.es (https://servicemesh.es/).
- Consul (https://consul.io/) - Solution to connect and configure applications across dynamic, distributed infrastructure and, with Consul Connect, enabling secure service-to-service communication with automatic
TLS encryption and identity-based authorization.
- Consul (https://consul.io/) - Solution to connect and configure applications across dynamic, distributed infrastructure and, with Consul Connect, enabling secure service-to-service 
communication with automatic TLS encryption and identity-based authorization.
- Istio (https://istio.io/) - Open platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data.
Communications security (COMSEC)
@@ -157,11 +161,12 @@
See also Transport-layer defenses (#transport-layer-defenses).
- GPG Sync (https://github.com/firstlookmedia/gpgsync) - Centralize and automate OpenPGP public key distribution, revocation, and updates amongst all members of an organization or team.
- Geneva (Genetic Evasion) (https://censorship.ai/) - Novel experimental genetic algorithm that evolves packet-manipulation-based censorship evasion strategies against nation-state level censors to increase 
availability of otherwise blocked content.
- Geneva (Genetic Evasion) (https://censorship.ai/) - Novel experimental genetic algorithm that evolves packet-manipulation-based censorship evasion strategies against nation-state level 
censors to increase availability of otherwise blocked content.
- GlobaLeaks (https://www.globaleaks.org/) - Free, open source software enabling anyone to easily set up and maintain a secure whistleblowing platform.
- SecureDrop (https://securedrop.org/) - Open source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources.
- Teleport (https://goteleport.com/) - Allows engineers and security professionals to unify access for SSH servers, Kubernetes clusters, web applications, and databases across all environments.
- Teleport (https://goteleport.com/) - Allows engineers and security professionals to unify access for SSH servers, Kubernetes clusters, web applications, and databases across all 
environments.
DevSecOps
@@ -170,8 +175,8 @@
- Bane (https://github.com/genuinetools/bane) - Custom and better AppArmor profile generator for Docker containers.
- BlackBox (https://github.com/StackExchange/blackbox) - Safely store secrets in Git/Mercurial/Subversion by encrypting them "at rest" using GnuPG.
- Checkov (https://www.checkov.io/) - Static analysis for Terraform (infrastructure as code) to help detect CIS policy violations and prevent cloud security misconfiguration.
- Cilium (https://cilium.io/) - Open source software for transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and 
Kubernetes.
- Cilium (https://cilium.io/) - Open source software for transparently securing the network connectivity between application services deployed using Linux container management platforms like 
Docker and Kubernetes.
- Clair (https://github.com/coreos/clair) - Static analysis tool to probe for vulnerabilities introduced via application container (e.g., Docker) images.
- CodeQL (https://securitylab.github.com/tools/codeql) - Discover vulnerabilities across a codebase by performing queries against code as though it were data.
- DefectDojo (https://www.defectdojo.org/) - Application vulnerability management tool built for DevOps and continuous security integration.
@@ -184,23 +189,25 @@
- Vault (https://www.vaultproject.io/) - Tool for securely accessing secrets such as API keys, passwords, or certificates through a unified interface.
- git-crypt (https://www.agwa.name/projects/git-crypt/) - Transparent file encryption in git; files which you choose to protect are encrypted when committed, and decrypted when checked out.
- helm-secrets (https://github.com/jkroepke/helm-secrets) - Helm plugin that helps manage secrets with Git workflow and stores them anywhere, backed by SOPS.
- terrascan (https://runterrascan.io/) - Static code analyzer for Infrastructure as Code tools that helps detect compliance and security violations to mitigate risk before provisioning cloud native resources.
- terrascan (https://runterrascan.io/) - Static code analyzer for Infrastructure as Code tools that helps detect compliance and security violations to mitigate risk before provisioning cloud 
native resources.
- tfsec (https://aquasecurity.github.io/tfsec/) - Static analysis security scanner for your Terraform code designed to run locally and in CI pipelines.
Application or Binary Hardening
- DynInst (https://dyninst.org/dyninst) - Tools for binary instrumentation, analysis, and modification, useful for binary patching.
- DynamoRIO (https://dynamorio.org/) - Runtime code manipulation system that supports code transformations on any part of a program, while it executes, implemented as a process-level virtual machine.
- Egalito (https://egalito.org/) - Binary recompiler and instrumentation framework that can fully disassemble, transform, and regenerate ordinary Linux binaries designed for binary hardening and security 
research.
- DynamoRIO (https://dynamorio.org/) - Runtime code manipulation system that supports code transformations on any part of a program, while it executes, implemented as a process-level virtual 
machine.
- Egalito (https://egalito.org/) - Binary recompiler and instrumentation framework that can fully disassemble, transform, and regenerate ordinary Linux binaries designed for binary hardening 
and security research.
- Valgrind (https://www.valgrind.org/) - Instrumentation framework for building dynamic analysis tools.
Compliance testing and reporting
- Chef InSpec (https://www.chef.io/products/chef-inspec) - Language for describing security and compliance rules, which become automated tests that can be run against IT infrastructures to discover and report on
non-compliance.
- OpenSCAP Base (https://www.open-scap.org/tools/openscap-base/) - Both a library and a command line tool (oscap) used to evaluate a system against SCAP baseline profiles to report on the security posture of the
scanned system(s). 
- Chef InSpec (https://www.chef.io/products/chef-inspec) - Language for describing security and compliance rules, which become automated tests that can be run against IT infrastructures to 
discover and report on non-compliance.
- OpenSCAP Base (https://www.open-scap.org/tools/openscap-base/) - Both a library and a command line tool (oscap) used to evaluate a system against SCAP baseline profiles to report on the 
security posture of the scanned system(s). 
Dependency confusion
@@ -214,7 +221,8 @@
See also Awesome-Fuzzing (https://github.com/secfigo/Awesome-Fuzzing).
⟡ Atheris (https://pypi.org/project/atheris/) - Coverage-guided Python fuzzing engine based off of libFuzzer that supports fuzzing of Python code but also native extensions written for CPython.
⟡ Atheris
 (https://pypi.org/project/atheris/) - Coverage-guided Python fuzzing engine based off of libFuzzer that supports fuzzing of Python code but also native extensions written for CPython.
⟡ FuzzBench (https://google.github.io/fuzzbench/) - Free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale.
⟡ OneFuzz (https://github.com/microsoft/onefuzz) - Self-hosted Fuzzing-as-a-Service (FaaS) platform.
@@ -223,8 +231,8 @@
- AllStar (https://github.com/ossf/allstar) - GitHub App installed on organizations or repositories to set and enforce security policies.
- Conftest (https://conftest.dev/) - Utility to help you write tests against structured configuration data.
- Open Policy Agent (OPA) (https://www.openpolicyagent.org/) - Unified toolset and framework for policy across the cloud native stack.
- Regula (https://regula.dev/) - Checks infrastructure as code templates (Terraform, CloudFormation, K8s manifests) for AWS, Azure, Google Cloud, and Kubernetes security and compliance using Open Policy 
Agent/Rego.
- Regula (https://regula.dev/) - Checks infrastructure as code templates (Terraform, CloudFormation, K8s manifests) for AWS, Azure, Google Cloud, and Kubernetes security and compliance using 
Open Policy Agent/Rego.
- Tang (https://github.com/latchset/tang) - Server for binding data to network presence; provides data to clients only when they are on a certain (secured) network.
Supply chain security
@@ -242,19 +250,20 @@
- CanaryTokens (https://github.com/thinkst/canarytokens) - Self-hostable honeytoken generator and reporting dashboard; demo version available at CanaryTokens.org (https://canarytokens.org/).
- Kushtaka (https://kushtaka.org) - Sustainable all-in-one honeypot and honeytoken orchestrator for under-resourced blue teams.
- Manuka (https://github.com/spaceraccoon/manuka) - Open-sources intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue Teamers.
- Manuka (https://github.com/spaceraccoon/manuka) - Open-sources intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for
Blue Teamers.
Tarpits
- Endlessh (https://github.com/skeeto/endlessh) - SSH tarpit that slowly sends an endless banner.
- LaBrea (http://labrea.sourceforge.net/labrea-info.html) - Program that answers ARP requests for unused IP space, creating the appearance of fake machines that answer further requests very slowly in order to 
slow down scanners, worms, etcetera.
- LaBrea (http://labrea.sourceforge.net/labrea-info.html) - Program that answers ARP requests for unused IP space, creating the appearance of fake machines that answer further requests very 
slowly in order to slow down scanners, worms, etcetera.
Host-based tools
- Artillery (https://github.com/BinaryDefense/artillery) - Combination honeypot, filesystem monitor, and alerting system designed to protect Linux and Windows operating systems.
- Crowd Inspect (https://www.crowdstrike.com/resources/community-tools/crowdinspect-tool/) - Free tool for Windows systems aimed to alert you to the presence of malware that may be communicating over the 
network.
- Crowd Inspect (https://www.crowdstrike.com/resources/community-tools/crowdinspect-tool/) - Free tool for Windows systems aimed to alert you to the presence of malware that may be 
communicating over the network.
- Fail2ban (https://www.fail2ban.org/) - Intrusion prevention software framework that protects computer servers from brute-force attacks.
- Open Source HIDS SECurity (OSSEC) (https://www.ossec.net/) - Fully open source and free, feature-rich, Host-based Instrusion Detection System (HIDS).
- Rootkit Hunter (rkhunter) (http://rkhunter.sourceforge.net/) - POSIX-compliant Bash script that scans a host for various signs of malware.
@@ -266,7 +275,8 @@
- Bubblewrap (https://github.com/containers/bubblewrap) - Sandboxing tool for use by unprivileged Linux users capable of restricting access to parts of the operating system or user data.
- Dangerzone (https://dangerzone.rocks/) - Take potentially dangerous PDFs, office documents, or images and convert them to a safe PDF.
- Firejail (https://firejail.wordpress.com/) - SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf.
- Firejail (https://firejail.wordpress.com/) - SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces 
and seccomp-bpf.
Identity and AuthN/AuthZ
@@ -285,21 +295,23 @@
See also Security Orchestration, Automation, and Response (SOAR) (#security-orchestration-automation-and-response-soar).
- CIRTKit (https://github.com/opensourcesec/CIRTKit) - Scriptable Digital Forensics and Incident Response (DFIR) toolkit built on Viper.
- Fast Incident Response (FIR) (https://github.com/certsocietegenerale/FIR) - Cybersecurity incident management platform allowing for easy creation, tracking, and reporting of cybersecurity incidents.
- Fast Incident Response (FIR) (https://github.com/certsocietegenerale/FIR) - Cybersecurity incident management platform allowing for easy creation, tracking, and reporting of cybersecurity 
incidents.
- Rekall (http://www.rekall-forensic.com/) - Advanced forensic and incident response framework.
- TheHive (https://thehive-project.org/) - Scalable, free Security Incident Response Platform designed to make life easier for SOCs, CSIRTs, and CERTs, featuring tight integration with MISP.
- threat_note (https://github.com/defpoint/threat_note) - Web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related to their research.
- threat_note (https://github.com/defpoint/threat_note) - Web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related to 
their research.
Evidence collection
- AutoMacTC (https://github.com/CrowdStrike/automactc) - Modular, automated forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and present them in formats 
viable for analysis.
- AutoMacTC (https://github.com/CrowdStrike/automactc) - Modular, automated forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and 
present them in formats viable for analysis.
- OSXAuditor (https://github.com/jipegit/OSXAuditor) - Free macOS computer forensics tool.
- OSXCollector (https://github.com/Yelp/osxcollector) - Forensic evidence collection & analysis toolkit for macOS.
- ir-rescue (https://github.com/diogo-fernan/ir-rescue) - Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
- Margarita Shotgun (https://github.com/ThreatResponse/margaritashotgun) - Command line utility (that works with or without Amazon EC2 instances) to parallelize remote memory acquisition.
- Untitled Goose Tool (https://github.com/cisagov/untitledgoosetool) - Assists incident response teams by exporting cloud artifacts from Azure/AzureAD/M365 environments in order to run a full investigation 
despite lacking in logs ingested by a SIEM.
- Untitled Goose Tool (https://github.com/cisagov/untitledgoosetool) - Assists incident response teams by exporting cloud artifacts from Azure/AzureAD/M365 environments in order to run a full
investigation despite lacking in logs ingested by a SIEM.
Network perimeter defenses
@@ -319,8 +331,8 @@
- Computer Aided Investigative Environment (CAINE) (https://caine-live.net/) - Italian GNU/Linux live distribution that pre-packages numerous digital forensics and evidence collection tools.
- Security Onion (https://securityonion.net/) - Free and open source GNU/Linux distribution for intrusion detection, enterprise security monitoring, and log management.
- Qubes OS (https://qubes-os.org/) - Desktop environment built atop the Xen hypervisor project that runs each end-user program in its own virtual machine intended to provide strict security controls to constrain
the reach of any successful malware exploit.
- Qubes OS (https://qubes-os.org/) - Desktop environment built atop the Xen hypervisor project that runs each end-user program in its own virtual machine intended to provide strict security 
controls to constrain the reach of any successful malware exploit.
Phishing awareness and reporting
@@ -331,10 +343,11 @@
- King Phisher (https://github.com/securestate/king-phisher) - Tool for testing and promoting user awareness by simulating real world phishing attacks.
- NotifySecurity (https://github.com/certsocietegenerale/NotifySecurity) - Outlook add-in used to help your users to report suspicious e-mails to security teams.
- Phishing Intelligence Engine (PIE) (https://github.com/LogRhythm-Labs/PIE) - Framework that will assist with the detection and response to phishing attacks.
- Swordphish (https://github.com/certsocietegenerale/swordphish-awareness) - Platform allowing to create and manage (fake) phishing campaigns intended to train people in identifying suspicious mails. 
- Swordphish (https://github.com/certsocietegenerale/swordphish-awareness) - Platform allowing to create and manage (fake) phishing campaigns intended to train people in identifying 
suspicious mails. 
- mailspoof (https://github.com/serain/mailspoof) - Scans SPF and DMARC records for issues that could allow email spoofing.
- phishing_catcher (https://github.com/x0rz/phishing_catcher) - Configurable script to watch for issuances of suspicious TLS certificates by domain name in the Certificate Transparency Log (CTL) using the 
CertStream (https://certstream.calidog.io/) service.
- phishing_catcher (https://github.com/x0rz/phishing_catcher) - Configurable script to watch for issuances of suspicious TLS certificates by domain name in the Certificate Transparency Log 
(CTL) using the CertStream (https://certstream.calidog.io/) service.
Preparedness training and wargaming
@@ -342,26 +355,28 @@
- APTSimulator (https://github.com/NextronSystems/APTSimulator) - Toolset to make a system look as if it was the victim of an APT attack.
- Atomic Red Team (https://atomicredteam.io/) - Library of simple, automatable tests to execute for testing security controls.
- BadBlood (https://www.secframe.com/badblood/) - Fills a test (non-production) Windows Domain with data that enables security analysts and engineers to practice using tools to gain an understanding and 
prescribe to securing Active Directory.
- BadBlood (https://www.secframe.com/badblood/) - Fills a test (non-production) Windows Domain with data that enables security analysts and engineers to practice using tools to gain an 
understanding and prescribe to securing Active Directory.
- Caldera (https://caldera.mitre.org/) - Scalable, automated, and extensible adversary emulation platform developed by MITRE.
- Drool (https://www.dns-oarc.net/tools/drool) - Replay DNS traffic from packet capture files and send it to a specified server, such as for simulating DDoS attacks on the DNS and measuring normal DNS querying.
- DumpsterFire (https://github.com/TryCatchHCF/DumpsterFire) - Modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events for Blue Team drills and sensor/alert 
mapping.
- Infection Monkey (https://www.guardicore.com/infectionmonkey/) - Open-source breach and attack simulation (BAS) platform that helps you validate existing controls and identify how attackers might exploit your 
current network security gaps.
- Drool (https://www.dns-oarc.net/tools/drool) - Replay DNS traffic from packet capture files and send it to a specified server, such as for simulating DDoS attacks on the DNS and measuring 
normal DNS querying.
- DumpsterFire (https://github.com/TryCatchHCF/DumpsterFire) - Modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events for Blue Team 
drills and sensor/alert mapping.
- Infection Monkey (https://www.guardicore.com/infectionmonkey/) - Open-source breach and attack simulation (BAS) platform that helps you validate existing controls and identify how attackers
might exploit your current network security gaps.
- Metta (https://github.com/uber-common/metta) - Automated information security preparedness tool to do adversarial simulation.
- Network Flight Simulator (flightsim) (https://github.com/alphasoc/flightsim) - Utility to generate malicious network traffic and help security teams evaluate security controls and audit their network 
visibility.
- Network Flight Simulator (flightsim) (https://github.com/alphasoc/flightsim) - Utility to generate malicious network traffic and help security teams evaluate security controls and audit 
their network visibility.
- RedHunt OS (https://github.com/redhuntlabs/RedHunt-OS) - Ubuntu-based Open Virtual Appliance (.ova) preconfigured with several threat emulation tools as well as a defender's toolkit.
- Stratus Red Team (https://stratus-red-team.cloud/) - Emulate offensive attack techniques in a granular and self-contained manner against a cloud environment; think "Atomic Red Team™ for the cloud."
- tcpreplay (https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic originally designed to replay malicious traffic patterns to 
Intrusion Detection/Prevention Systems.
- Stratus Red Team (https://stratus-red-team.cloud/) - Emulate offensive attack techniques in a granular and self-contained manner against a cloud environment; think "Atomic Red Team™ for the
cloud."
- tcpreplay (https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic originally designed to replay malicious 
traffic patterns to Intrusion Detection/Prevention Systems.
Post-engagement analysis and reporting
- RedEye (https://cisagov.github.io/RedEye/) - Analytic tool to assist both Red and Blue teams with visualizing and reporting command and control activities, replay and demonstrate attack paths, and more clearly
communicate remediation recommendations to stakeholders.
- RedEye (https://cisagov.github.io/RedEye/) - Analytic tool to assist both Red and Blue teams with visualizing and reporting command and control activities, replay and demonstrate attack 
paths, and more clearly communicate remediation recommendations to stakeholders.
Security configurations
@@ -371,8 +386,10 @@
Security monitoring
- Crossfeed (https://docs.crossfeed.cyber.dhs.gov/) - Continuously enumerates and monitors an organizations public-facing attack surface in order to discover assets and flag potential security flaws.
- Starbase (https://github.com/JupiterOne/starbase) - Collects assets and relationships from services and systems into an intuitive graph view to offer graph-based security analysis for everyone.
- Crossfeed (https://docs.crossfeed.cyber.dhs.gov/) - Continuously enumerates and monitors an organizations public-facing attack surface in order to discover assets and flag potential 
security flaws.
- Starbase (https://github.com/JupiterOne/starbase) - Collects assets and relationships from services and systems into an intuitive graph view to offer graph-based security analysis for 
everyone.
Endpoint Detection and Response (EDR)
@@ -386,25 +403,27 @@
- ChopShop (https://github.com/MITRECND/chopshop) - Framework to aid analysts in the creation and execution of pynids-based decoders and detectors of APT tradecraft.
- Maltrail (https://github.com/stamparm/maltrail) - Malicious network traffic detection system.
- OwlH (https://www.owlh.net/) - Helps manage network IDS at scale by visualizing Suricata, Zeek, and Moloch life cycles.
- Real Intelligence Threat Analysis (RITA) (https://github.com/activecm/rita) - Open source framework for network traffic analysis that ingests Zeek logs and detects beaconing, DNS tunneling, and more.
- Real Intelligence Threat Analysis (RITA) (https://github.com/activecm/rita) - Open source framework for network traffic analysis that ingests Zeek logs and detects beaconing, DNS tunneling,
and more.
- Respounder (https://github.com/codeexpress/respounder) - Detects the presence of the Responder LLMNR/NBT-NS/MDNS poisoner on a network.
- Snort (https://snort.org/) - Widely-deployed, Free Software IPS capable of real-time packet analysis, traffic logging, and custom rule-based triggers.
- SpoofSpotter (https://github.com/NetSPI/SpoofSpotter) - Catch spoofed NetBIOS Name Service (NBNS) responses and alert to an email or log file.
- Stenographer (https://github.com/google/stenographer) - Full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes.
- Suricata (https://suricata-ids.org/) - Free, cross-platform, IDS/IPS with on- and off-line analysis modes and deep packet inspection capabilities that is also scriptable with Lua.
- Tsunami (https://github.com/google/tsunami-security-scanner) - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. 
- Tsunami (https://github.com/google/tsunami-security-scanner) - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with 
high confidence. 
- VAST (https://github.com/tenzir/vast) - Free and open-source network telemetry engine for data-driven security investigations.
- Wireshark (https://www.wireshark.org) - Free and open-source packet analyzer useful for network troubleshooting or forensic netflow analysis.
- Zeek (https://zeek.org/) - Powerful network analysis framework focused on security monitoring, formerly known as Bro.
- netsniff-ng (http://netsniff-ng.org/) - Free and fast GNU/Linux networking toolkit with numerous utilities such as a connection tracking tool (flowtop), traffic generator (trafgen), and autonomous system (AS)
trace route utility (astraceroute).
- netsniff-ng (http://netsniff-ng.org/) - Free and fast GNU/Linux networking toolkit with numerous utilities such as a connection tracking tool (flowtop), traffic generator (trafgen), and 
autonomous system (AS) trace route utility (astraceroute).
Security Information and Event Management (SIEM)
- AlienVault OSSIM (https://www.alienvault.com/open-threat-exchange/projects) - Single-server open source SIEM platform featuring asset discovery, asset inventorying, behavioral monitoring, and event 
correlation, driven by AlienVault Open Threat Exchange (OTX).
- Prelude SIEM OSS (https://www.prelude-siem.org/) - Open source, agentless SIEM with a long history and several commercial variants featuring security event collection, normalization, and alerting from 
arbitrary log input and numerous popular monitoring tools.
- AlienVault OSSIM (https://www.alienvault.com/open-threat-exchange/projects) - Single-server open source SIEM platform featuring asset discovery, asset inventorying, behavioral monitoring, 
and event correlation, driven by AlienVault Open Threat Exchange (OTX).
- Prelude SIEM OSS (https://www.prelude-siem.org/) - Open source, agentless SIEM with a long history and several commercial variants featuring security event collection, normalization, and 
alerting from arbitrary log input and numerous popular monitoring tools.
Service and performance monitoring
@@ -413,10 +432,10 @@
- Icinga (https://icinga.com/) - Modular redesign of Nagios with pluggable user interfaces and an expanded set of data connectors, collectors, and reporting tools.
- Locust (https://locust.io/) - Open source load testing tool in which you can define user behaviour with Python code and swarm your system with millions of simultaneous users.
- Nagios (https://nagios.org) - Popular network and service monitoring solution and reporting platform.
- OpenNMS (https://opennms.org/) - Free and feature-rich networking monitoring system supporting multiple configurations, a variety of alerting mechanisms (email, XMPP, SMS), and numerous data collection methods
(SNMP, HTTP, JDBC, etc).
- osquery (https://github.com/facebook/osquery) - Operating system instrumentation framework for macOS, Windows, and Linux, exposing the OS as a high-performance relational database that can be queried with a 
SQL-like syntax.
- OpenNMS (https://opennms.org/) - Free and feature-rich networking monitoring system supporting multiple configurations, a variety of alerting mechanisms (email, XMPP, SMS), and numerous 
data collection methods (SNMP, HTTP, JDBC, etc).
- osquery (https://github.com/facebook/osquery) - Operating system instrumentation framework for macOS, Windows, and Linux, exposing the OS as a high-performance relational database that can 
be queried with a SQL-like syntax.
- Zabbix (https://www.zabbix.com/) - Mature, enterprise-level platform to monitor large-scale IT environments.
Threat hunting
@@ -427,14 +446,14 @@
- CimSweep (https://github.com/PowerShellMafia/CimSweep) - Suite of CIM/WMI-based tools enabling remote incident response and hunting operations across all versions of Windows.
- DeepBlueCLI (https://github.com/sans-blue-team/DeepBlueCLI) - PowerShell module for hunt teaming via Windows Event logs.
- GRR Rapid Response (https://github.com/google/grr) - Incident response framework focused on remote live forensics consisting of a Python agent installed on assets and Python-based server infrastructure 
enabling analysts to quickly triage attacks and perform analysis remotely.
- Hunting ELK (HELK) (https://github.com/Cyb3rWard0g/HELK) - All-in-one Free Software threat hunting stack based on Elasticsearch, Logstash, Kafka, and Kibana with various built-in integrations for analytics 
including Jupyter Notebook.
- GRR Rapid Response (https://github.com/google/grr) - Incident response framework focused on remote live forensics consisting of a Python agent installed on assets and Python-based server 
infrastructure enabling analysts to quickly triage attacks and perform analysis remotely.
- Hunting ELK (HELK) (https://github.com/Cyb3rWard0g/HELK) - All-in-one Free Software threat hunting stack based on Elasticsearch, Logstash, Kafka, and Kibana with various built-in 
integrations for analytics including Jupyter Notebook.
- Logging Made Easy (LME) (https://www.cisa.gov/resources-tools/services/logging-made-easy) - Free and open logging and protective monitoring solution serving.
- MozDef (https://github.com/mozilla/MozDef) - Automate the security incident handling process and facilitate the real-time activities of incident handlers.
- PSHunt (https://github.com/Infocyte/PSHunt) - PowerShell module designed to scan remote endpoints for indicators of compromise or survey them for more comprehensive information related to state of those 
systems.
- PSHunt (https://github.com/Infocyte/PSHunt) - PowerShell module designed to scan remote endpoints for indicators of compromise or survey them for more comprehensive information related to 
state of those systems.
- PSRecon (https://github.com/gfoss/PSRecon) - PSHunt-like tool for analyzing remote Windows systems that also produces a self-contained HTML report of its findings.
- PowerForensics (https://github.com/Invoke-IR/PowerForensics) - All in one PowerShell-based platform to perform live hard disk forensic analysis.
- Redline (https://www.fireeye.com/services/freeware/redline.html) - Freeware endpoint auditing and analysis tool that provides host-based investigative capabilities, offered by FireEye, Inc.
@@ -445,21 +464,25 @@
See also awesome-threat-intelligence (https://github.com/hslatman/awesome-threat-intelligence).
- AttackerKB (https://attackerkb.com/) - Free and public crowdsourced vulnerability assessment platform to help prioritize high-risk patch application and combat vulnerability fatigue.
- DATA (https://github.com/hadojae/DATA) - Credential phish analysis and automation tool that can accept suspected phishing URLs directly or trigger on observed network traffic containing such a URL.
- Forager (https://github.com/opensourcesec/Forager) - Multi-threaded threat intelligence gathering built with Python3 featuring simple text-based configuration and data storage for ease of use and data 
portability.
- GRASSMARLIN (https://github.com/nsacyber/GRASSMARLIN) - Provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) by passively mapping, 
accounting for, and reporting on your ICS/SCADA network topology and endpoints.
- DATA (https://github.com/hadojae/DATA) - Credential phish analysis and automation tool that can accept suspected phishing URLs directly or trigger on observed network traffic containing 
such a URL.
- Forager (https://github.com/opensourcesec/Forager) - Multi-threaded threat intelligence gathering built with Python3 featuring simple text-based configuration and data storage for ease of 
use and data portability.
- GRASSMARLIN (https://github.com/nsacyber/GRASSMARLIN) - Provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) by
passively mapping, accounting for, and reporting on your ICS/SCADA network topology and endpoints.
- MLSec Combine (https://github.com/mlsecproject/combine) - Gather and combine multiple threat intelligence feed sources into one customizable, standardized CSV-based format.
- Malware Information Sharing Platform and Threat Sharing (MISP) (https://misp-project.org/) - Open source software solution for collecting, storing, distributing and sharing cyber security indicators.
- Open Source Vulnerabilities (OSV) (https://osv.dev/) - Vulnerability database and triage infrastructure for open source projects aimed at helping both open source maintainers and consumers of open source.
- Sigma (https://github.com/Neo23x0/sigma) - Generic signature format for SIEM systems, offering an open signature format that allows you to describe relevant log events in a straightforward manner.
- Malware Information Sharing Platform and Threat Sharing (MISP) (https://misp-project.org/) - Open source software solution for collecting, storing, distributing and sharing cyber security 
indicators.
- Open Source Vulnerabilities (OSV) (https://osv.dev/) - Vulnerability database and triage infrastructure for open source projects aimed at helping both open source maintainers and consumers 
of open source.
- Sigma (https://github.com/Neo23x0/sigma) - Generic signature format for SIEM systems, offering an open signature format that allows you to describe relevant log events in a straightforward 
manner.
- Threat Bus (https://github.com/tenzir/threatbus) - Threat intelligence dissemination layer to connect security tools through a distributed publish/subscribe message broker.
- ThreatIngestor (https://github.com/InQuest/ThreatIngestor) - Extendable tool to extract and aggregate IOCs from threat feeds including Twitter, RSS feeds, or other sources.
- Unfetter (https://nsacyber.github.io/unfetter/) - Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework.
- Viper (https://github.com/viper-framework/viper) - Binary analysis and management framework enabling easy organization of malware and exploit samples.
- YARA (https://github.com/VirusTotal/yara) - Tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples, described as "the pattern matching swiss army knife" for 
file patterns and signatures.
- YARA (https://github.com/VirusTotal/yara) - Tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples, described as "the pattern matching swiss
army knife" for file patterns and signatures.
Fingerprinting
@@ -469,12 +492,12 @@
Threat signature packages and collections
- ESET's Malware IoCs (https://github.com/eset/malware-ioc) - Indicators of Compromises (IOCs) derived from ESET's various investigations.
- FireEye's Red Team Tool Countermeasures (https://github.com/fireeye/red_team_tool_countermeasures) - Collection of Snort and YARA rules to detect attacks carried out with FireEye's own Red Team tools, first 
released after FireEye disclosed a breach in December 2020.
- FireEye's Sunburst Countermeasures (https://github.com/fireeye/sunburst_countermeasures) - Collection of IoC in various languages for detecting backdoored SolarWinds Orion NMS activities and related 
vulnerabilities.
- YARA Rules (https://github.com/Yara-Rules/rules) - Project covering the need for IT security researchers to have a single repository where different Yara signatures are compiled, classified and kept as up to 
date as possible.
- FireEye's Red Team Tool Countermeasures (https://github.com/fireeye/red_team_tool_countermeasures) - Collection of Snort and YARA rules to detect attacks carried out with FireEye's own Red 
Team tools, first released after FireEye disclosed a breach in December 2020.
- FireEye's Sunburst Countermeasures (https://github.com/fireeye/sunburst_countermeasures) - Collection of IoC in various languages for detecting backdoored SolarWinds Orion NMS activities 
and related vulnerabilities.
- YARA Rules (https://github.com/Yara-Rules/rules) - Project covering the need for IT security researchers to have a single repository where different Yara signatures are compiled, classified
and kept as up to date as possible.
Tor Onion service defenses
@@ -485,11 +508,11 @@
Transport-layer defenses
- Certbot (https://certbot.eff.org/) - Free tool to automate the issuance and renewal of TLS certificates from the LetsEncrypt Root CA (https://letsencrypt.org/) with plugins that configure various Web and 
e-mail server software.
- Certbot (https://certbot.eff.org/) - Free tool to automate the issuance and renewal of TLS certificates from the LetsEncrypt Root CA (https://letsencrypt.org/) with plugins that configure 
various Web and e-mail server software.
- MITMEngine (https://github.com/cloudflare/mitmengine) - Golang library for server-side detection of TLS interception events.
- Tor (https://torproject.org/) - Censorship circumvention and anonymizing overlay network providing distributed, cryptographically verified name services (.onion domains) to enhance publisher privacy and 
service availability.
- Tor (https://torproject.org/) - Censorship circumvention and anonymizing overlay network providing distributed, cryptographically verified name services (.onion domains) to enhance 
publisher privacy and service availability.
Overlay and Virtual Private Networks (VPNs)
@@ -497,7 +520,8 @@
- Headscale (https://github.com/juanfont/headscale) - Open source, self-hosted implementation of the Tailscale control server.
- IPsec VPN Server Auto Setup Scripts (https://github.com/hwdsl2/setup-ipsec-vpn) - Scripts to build your own IPsec VPN server, with IPsec/L2TP, Cisco IPsec and IKEv2.
- Innernet (https://github.com/tonarino/innernet) - Free Software private network system that uses WireGuard under the hood, made to be self-hosted.
- Nebula (https://github.com/slackhq/nebula) - Completely open source and self-hosted, scalable overlay networking tool with a focus on performance, simplicity, and security, inspired by tinc.
- Nebula (https://github.com/slackhq/nebula) - Completely open source and self-hosted, scalable overlay networking tool with a focus on performance, simplicity, and security, inspired by 
tinc.
- OpenVPN (https://openvpn.net/) - Longstanding Free Software traditional SSL/TLS-based virtual private network.
- OpenZITI (https://openziti.github.io/) - Open source initiative focused on bringing Zero Trust to any application via an overlay network, tunelling applications, and numerous SDKs.
- Tailscale (https://tailscale.com/) - Managed freemium mesh VPN service built on top of WireGuard.
@@ -508,13 +532,13 @@
See also drduh/macOS-Security-and-Privacy-Guide (https://github.com/drduh/macOS-Security-and-Privacy-Guide).
- BlockBlock (https://objective-see.com/products/blockblock.html) - Monitors common persistence locations and alerts whenever a persistent component is added, which helps to detect and prevent malware 
installation.
- BlockBlock (https://objective-see.com/products/blockblock.html) - Monitors common persistence locations and alerts whenever a persistent component is added, which helps to detect and 
prevent malware installation.
- LuLu (https://objective-see.com/products/lulu.html) - Free macOS firewall.
- Santa (https://github.com/google/santa) - Keep track of binaries that are naughty or nice in an allow/deny-listing system for macOS.
- Stronghold (https://github.com/alichtman/stronghold) - Easily configure macOS security settings from the terminal.
- macOS Fortress (https://github.com/essandess/macOS-Fortress) - Automated configuration of kernel-level, OS-level, and client-level security features including privatizing proxying and anti-virus scanning for 
macOS.
- macOS Fortress (https://github.com/essandess/macOS-Fortress) - Automated configuration of kernel-level, OS-level, and client-level security features including privatizing proxying and 
anti-virus scanning for macOS.
Windows-based defenses
@@ -522,23 +546,24 @@
- CobaltStrikeScan (https://github.com/Apr4h/CobaltStrikeScan) - Scan files or process memory for Cobalt Strike beacons and parse their configuration.
- HardenTools (https://github.com/securitywithoutborders/hardentools) - Utility that disables a number of risky Windows features.
- NotRuler (https://github.com/sensepost/notruler) - Detect both client-side rules and VBScript enabled forms used by the Ruler (https://github.com/sensepost/ruler) attack tool when attempting to compromise a 
Microsoft Exchange server.
- NotRuler (https://github.com/sensepost/notruler) - Detect both client-side rules and VBScript enabled forms used by the Ruler (https://github.com/sensepost/ruler) attack tool when 
attempting to compromise a Microsoft Exchange server.
- Sandboxie (https://www.sandboxie.com/) - Free and open source general purpose Windows application sandboxing utility.
- Sigcheck (https://docs.microsoft.com/en-us/sysinternals/downloads/sigcheck) - Audit a Windows host's root certificate store against Microsoft's Certificate Trust List (CTL) 
(https://docs.microsoft.com/en-us/windows/desktop/SecCrypto/certificate-trust-list-overview).
- Sticky Keys Slayer (https://github.com/linuz/Sticky-Keys-Slayer) - Establishes a Windows RDP session from a list of hostnames and scans for accessibility tools backdoors, alerting if one is discovered.
- Windows Secure Host Baseline (https://github.com/nsacyber/Windows-Secure-Host-Baseline) - Group Policy objects, compliance checks, and configuration tools that provide an automated and flexible approach for 
securely deploying and maintaining the latest releases of Windows 10.
- Sticky Keys Slayer (https://github.com/linuz/Sticky-Keys-Slayer) - Establishes a Windows RDP session from a list of hostnames and scans for accessibility tools backdoors, alerting if one is
discovered.
- Windows Secure Host Baseline (https://github.com/nsacyber/Windows-Secure-Host-Baseline) - Group Policy objects, compliance checks, and configuration tools that provide an automated and 
flexible approach for securely deploying and maintaining the latest releases of Windows 10.
- WMI Monitor (https://github.com/realparisi/WMI_Monitor) - Log newly created WMI consumers and processes to the Windows Application event log.
Active Directory
- Active Directory Control Paths (https://github.com/ANSSI-FR/AD-control-paths) - Visualize and graph Active Directory permission configs ("control relations") to audit questions such as "Who can read the CEO's 
email?" and similar.
- Active Directory Control Paths (https://github.com/ANSSI-FR/AD-control-paths) - Visualize and graph Active Directory permission configs ("control relations") to audit questions such as "Who
can read the CEO's email?" and similar.
- PingCastle (https://www.pingcastle.com/) - Active Directory vulnerability detection and reporting tool.
- PlumHound (https://github.com/PlumHound/PlumHound) - More effectively use BloodHoundAD in continual security life-cycles by utilizing its pathfinding engine to identify Active Directory security 
vulnerabilities.
- PlumHound (https://github.com/PlumHound/PlumHound) - More effectively use BloodHoundAD in continual security life-cycles by utilizing its pathfinding engine to identify Active Directory 
security vulnerabilities.
License