update lists
This commit is contained in:
@@ -1,20 +1,19 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Cybersecurity Blue Team [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge-flat2.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Cybersecurity Blue Team [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge-flat2.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
|
||||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mA collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.[39m
|
||||
|
||||
[38;5;14m[1mCybersecurity[0m[38;5;14m[1m [0m[38;5;14m[1mblue[0m[38;5;14m[1m [0m[38;5;14m[1mteams[0m[38;5;12m [39m[38;5;12m(https://en.wikipedia.org/wiki/Blue_team_(computer_security))[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mgroups[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mindividuals[39m[38;5;12m [39m[38;5;12mwho[39m[38;5;12m [39m[38;5;12midentify[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mflaws[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mtechnology[39m[38;5;12m [39m[38;5;12msystems,[39m[38;5;12m [39m[38;5;12mverify[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12meffectiveness[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mmeasures,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmonitor[39m[38;5;12m [39m
|
||||
[38;5;12mthe[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mensure[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mimplemented[39m[38;5;12m [39m[38;5;12mdefensive[39m[38;5;12m [39m[38;5;12mmeasures[39m[38;5;12m [39m[38;5;12mremain[39m[38;5;12m [39m[38;5;12meffective[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mfuture.[39m[38;5;12m [39m[38;5;12mWhile[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12mexclusive,[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mheavily[39m[38;5;12m [39m[38;5;12mbiased[39m[38;5;12m [39m[38;5;12mtowards[39m[38;5;12m [39m[38;5;14m[1mFree[0m[38;5;14m[1m [0m[38;5;14m[1mSoftware[0m[38;5;12m [39m[38;5;12m(https://www.gnu.org/philosophy/free-sw.html)[39m[38;5;12m [39m[38;5;12mprojects[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m
|
||||
[38;5;12mproprietary[39m[38;5;12m [39m[38;5;12mproducts[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mcorporate[39m[38;5;12m [39m[38;5;12mservices.[39m[38;5;12m [39m[38;5;12mFor[39m[38;5;12m [39m[38;5;12moffensive[39m[38;5;12m [39m[38;5;12mTTPs,[39m[38;5;12m [39m[38;5;12mplease[39m[38;5;12m [39m[38;5;12msee[39m[38;5;12m [39m[38;5;14m[1mawesome-pentest[0m[38;5;12m [39m[38;5;12m(https://github.com/fabacab/awesome-pentest).[39m
|
||||
[38;5;14m[1mCybersecurity[0m[38;5;14m[1m [0m[38;5;14m[1mblue[0m[38;5;14m[1m [0m[38;5;14m[1mteams[0m[38;5;12m [39m[38;5;12m(https://en.wikipedia.org/wiki/Blue_team_(computer_security))[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mgroups[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mindividuals[39m[38;5;12m [39m[38;5;12mwho[39m[38;5;12m [39m[38;5;12midentify[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mflaws[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mtechnology[39m[38;5;12m [39m[38;5;12msystems,[39m[38;5;12m [39m[38;5;12mverify[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12meffectiveness[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mmeasures,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmonitor[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msystems[39m
|
||||
[38;5;12mto[39m[38;5;12m [39m[38;5;12mensure[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mimplemented[39m[38;5;12m [39m[38;5;12mdefensive[39m[38;5;12m [39m[38;5;12mmeasures[39m[38;5;12m [39m[38;5;12mremain[39m[38;5;12m [39m[38;5;12meffective[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mfuture.[39m[38;5;12m [39m[38;5;12mWhile[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12mexclusive,[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mheavily[39m[38;5;12m [39m[38;5;12mbiased[39m[38;5;12m [39m[38;5;12mtowards[39m[38;5;12m [39m[38;5;14m[1mFree[0m[38;5;14m[1m [0m[38;5;14m[1mSoftware[0m[38;5;12m [39m[38;5;12m(https://www.gnu.org/philosophy/free-sw.html)[39m[38;5;12m [39m[38;5;12mprojects[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mproprietary[39m[38;5;12m [39m[38;5;12mproducts[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m
|
||||
[38;5;12mcorporate[39m[38;5;12m [39m[38;5;12mservices.[39m[38;5;12m [39m[38;5;12mFor[39m[38;5;12m [39m[38;5;12moffensive[39m[38;5;12m [39m[38;5;12mTTPs,[39m[38;5;12m [39m[38;5;12mplease[39m[38;5;12m [39m[38;5;12msee[39m[38;5;12m [39m[38;5;14m[1mawesome-pentest[0m[38;5;12m [39m[38;5;12m(https://github.com/fabacab/awesome-pentest).[39m
|
||||
|
||||
[38;5;12mYour[39m[38;5;12m [39m[38;5;12mcontributions[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msuggestions[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mheartily[39m[38;5;12m [39m[38;5;12m♥[39m[38;5;12m [39m[38;5;12mwelcome.[39m[38;5;12m [39m[38;5;12m(✿◕‿◕).[39m[38;5;12m [39m[38;5;12mPlease[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;14m[1mContributing[0m[38;5;14m[1m [0m[38;5;14m[1mGuidelines[0m[38;5;12m [39m[38;5;12m(CONTRIBUTING.md)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mmore[39m[38;5;12m [39m[38;5;12mdetails.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mwork[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mlicensed[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mCreative[0m[38;5;14m[1m [0m[38;5;14m[1mCommons[0m[38;5;14m[1m [0m[38;5;14m[1mAttribution[0m[38;5;14m[1m [0m[38;5;14m[1m4.0[0m[38;5;14m[1m [0m[38;5;14m[1mInternational[0m[38;5;14m[1m [0m[38;5;14m[1mLicense[0m[38;5;12m [39m
|
||||
[38;5;12m(http://creativecommons.org/licenses/by/4.0/).[39m
|
||||
|
||||
[38;5;12mMany[39m[38;5;12m [39m[38;5;12mcybersecurity[39m[38;5;12m [39m[38;5;12mprofessionals[39m[38;5;12m [39m[38;5;12menable[39m[38;5;12m [39m[38;5;12mracist[39m[38;5;12m [39m[38;5;12mstate[39m[38;5;12m [39m[38;5;12mviolence,[39m[38;5;12m [39m[38;5;12mwittingly[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12munwittingly,[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12mservices[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mlocal,[39m[38;5;12m [39m[38;5;12mstate,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mfederal[39m[38;5;12m [39m[38;5;12mpolicing[39m[38;5;12m [39m[38;5;12magencies[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12motherwise[39m[38;5;12m [39m[38;5;12mcooperating[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12msimilar[39m[38;5;12m [39m[38;5;12minstitutions[39m[38;5;12m [39m[38;5;12mwho[39m[38;5;12m [39m[38;5;12mdo[39m[38;5;12m [39m[38;5;12mso.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mevil[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m
|
||||
[38;5;12moften[39m[38;5;12m [39m[38;5;12mhappens[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcoercive[39m[38;5;12m [39m[38;5;12mmechanism[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12memployment[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mlack[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12maccess[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mfood,[39m[38;5;12m [39m[38;5;12mshelter,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mhealthcare.[39m[38;5;12m [39m[38;5;12mDespite[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mlist's[39m[38;5;12m [39m[38;5;12mpublic[39m[38;5;12m [39m[38;5;12mavailability,[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmaintainer's[39m[38;5;12m [39m[38;5;12mintention[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhope[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12msupports[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m
|
||||
[38;5;12mpeople[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12morganizations[39m[38;5;12m [39m[38;5;12mwho[39m[38;5;12m [39m[38;5;12mwork[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcounter[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mmassive[39m[38;5;12m [39m[38;5;12malbeit[39m[38;5;12m [39m[38;5;12mbanal[39m[38;5;12m [39m[38;5;12mevil.[39m
|
||||
[38;5;12mMany[39m[38;5;12m [39m[38;5;12mcybersecurity[39m[38;5;12m [39m[38;5;12mprofessionals[39m[38;5;12m [39m[38;5;12menable[39m[38;5;12m [39m[38;5;12mracist[39m[38;5;12m [39m[38;5;12mstate[39m[38;5;12m [39m[38;5;12mviolence,[39m[38;5;12m [39m[38;5;12mwittingly[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12munwittingly,[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12mservices[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mlocal,[39m[38;5;12m [39m[38;5;12mstate,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mfederal[39m[38;5;12m [39m[38;5;12mpolicing[39m[38;5;12m [39m[38;5;12magencies[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12motherwise[39m[38;5;12m [39m[38;5;12mcooperating[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12msimilar[39m[38;5;12m [39m[38;5;12minstitutions[39m[38;5;12m [39m[38;5;12mwho[39m[38;5;12m [39m[38;5;12mdo[39m[38;5;12m [39m[38;5;12mso.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mevil[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12moften[39m[38;5;12m [39m
|
||||
[38;5;12mhappens[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcoercive[39m[38;5;12m [39m[38;5;12mmechanism[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12memployment[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mlack[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12maccess[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mfood,[39m[38;5;12m [39m[38;5;12mshelter,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mhealthcare.[39m[38;5;12m [39m[38;5;12mDespite[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mlist's[39m[38;5;12m [39m[38;5;12mpublic[39m[38;5;12m [39m[38;5;12mavailability,[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mmaintainer's[39m[38;5;12m [39m[38;5;12mintention[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhope[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12msupports[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpeople[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12morganizations[39m[38;5;12m [39m[38;5;12mwho[39m[38;5;12m [39m[38;5;12mwork[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcounter[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mmassive[39m[38;5;12m [39m[38;5;12malbeit[39m[38;5;12m [39m[38;5;12mbanal[39m[38;5;12m [39m[38;5;12mevil.[39m
|
||||
|
||||
[38;5;12m![39m[38;5;14m[1mImage[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mraised[0m[38;5;14m[1m [0m[38;5;14m[1mfist[0m[38;5;14m[1m [0m[38;5;14m[1mcomposed[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mthe[0m[38;5;14m[1m [0m[38;5;14m[1mnames[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mBlack[0m[38;5;14m[1m [0m[38;5;14m[1mpeople[0m[38;5;14m[1m [0m[38;5;14m[1mmurdered[0m[38;5;14m[1m [0m[38;5;14m[1mby[0m[38;5;14m[1m [0m[38;5;14m[1mtaxpayer-funded[0m[38;5;14m[1m [0m[38;5;14m[1mracist[0m[38;5;14m[1m [0m[38;5;14m[1mpolice[0m[38;5;14m[1m [0m[38;5;14m[1mviolence.[0m[38;5;12m [39m
|
||||
[38;5;12m(https://web.archive.org/web/20201028021653if_/https://lauerrealtygroup.com/wp-content/uploads/2020/06/BLM-FIST-scaled.jpg)[39m
|
||||
[38;5;12m![39m[38;5;14m[1mImage of a raised fist composed of the names of Black people murdered by taxpayer-funded racist police violence.[0m[38;5;12m (https://web.archive.org/web/20201028021653if_/https://lauerrealtygroup.com/wp-content/uploads/2020/06/BLM-FIST-scaled.jpg)[39m
|
||||
|
||||
[38;5;12m![39m[38;5;14m[1mImage of a "Blue Lives Matter" flag with the thin blue line being peeled away to reveal a Nazi swastika underneath.[0m[38;5;12m (https://web.archive.org/web/20201123181815if_/https://i.redd.it/86pl28p0dl631.jpg)[39m
|
||||
|
||||
@@ -22,7 +21,7 @@
|
||||
|
||||
[38;2;255;187;0m[4mContents[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mAutomation[0m[38;5;12m (#automation)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAutomation and Convention[0m[38;5;12m (#automation-and-convention)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mCode libraries and bindings[0m[38;5;12m (#code-libraries-and-bindings)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mSecurity Orchestration, Automation, and Response (SOAR)[0m[38;5;12m (#security-orchestration-automation-and-response-soar)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCloud platform security[0m[38;5;12m (#cloud-platform-security)[39m
|
||||
@@ -68,12 +67,13 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mWindows-based defenses[0m[38;5;12m (#windows-based-defenses)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mActive Directory[0m[38;5;12m (#active-directory)[39m
|
||||
|
||||
[38;2;255;187;0m[4mAutomation[0m
|
||||
[38;2;255;187;0m[4mAutomation and Convention[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mAnsible Lockdown[0m[38;5;12m (https://ansiblelockdown.io/) - Curated collection of information security themed Ansible roles that are both vetted and actively maintained.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mClevis[0m[38;5;12m (https://github.com/latchset/clevis) - Plugable framework for automated decryption, often used as a Tang client.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDShell[0m[38;5;12m (https://github.com/USArmyResearchLab/Dshell) - Extensible network forensic analysis framework written in Python that enables rapid development of plugins to support the dissection of network packet captures.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDev-Sec.io[0m[38;5;12m (https://dev-sec.io/) - Server hardening framework providing Ansible, Chef, and Puppet implementations of various baseline security configurations.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPassword Manager Resources[0m[38;5;12m (https://github.com/apple/password-manager-resources) - Collaborative, crowd-sourced data and code to make password management better.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mpeepdf[0m[38;5;12m (https://eternal-todo.com/tools/peepdf-pdf-analysis-tool) - Scriptable PDF file analyzer.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPyREBox[0m[38;5;12m (https://talosintelligence.com/pyrebox) - Python-scriptable reverse engineering sandbox, based on QEMU.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWatchtower[0m[38;5;12m (https://containrrr.dev/watchtower/) - Container-based solution for automating Docker container base image updates, providing an unattended upgrade experience.[39m
|
||||
@@ -99,12 +99,11 @@
|
||||
[38;5;12mSee also [39m[38;5;14m[1masecure.cloud/tools[0m[38;5;12m (https://asecure.cloud/tools/).[39m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mAaia[0m[38;5;12m (https://github.com/rams3sh/Aaia) - Helps in visualizing AWS IAM and Organizations in a graph format with help of Neo4j.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mFalco[0m[38;5;12m [39m[38;5;12m(https://falco.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mBehavioral[39m[38;5;12m [39m[38;5;12mactivity[39m[38;5;12m [39m[38;5;12mmonitor[39m[38;5;12m [39m[38;5;12mdesigned[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdetect[39m[38;5;12m [39m[38;5;12manomalous[39m[38;5;12m [39m[38;5;12mactivity[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mcontainerized[39m[38;5;12m [39m[38;5;12mapplications,[39m[38;5;12m [39m[38;5;12mhosts,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mpacket[39m[38;5;12m [39m[38;5;12mflows[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mauditing[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mLinux[39m[38;5;12m [39m[38;5;12mkernel[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12menriched[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mruntime[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mKubernetes[39m
|
||||
[38;5;12mmetrics.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mKata[0m[38;5;14m[1m [0m[38;5;14m[1mContainers[0m[38;5;12m [39m[38;5;12m(https://katacontainers.io/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSecure[39m[38;5;12m [39m[38;5;12mcontainer[39m[38;5;12m [39m[38;5;12mruntime[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mlightweight[39m[38;5;12m [39m[38;5;12mvirtual[39m[38;5;12m [39m[38;5;12mmachines[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mfeel[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m[38;5;12mlike[39m[38;5;12m [39m[38;5;12mcontainers,[39m[38;5;12m [39m[38;5;12mbut[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12mstronger[39m[38;5;12m [39m[38;5;12mworkload[39m[38;5;12m [39m[38;5;12misolation[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mhardware[39m[38;5;12m [39m[38;5;12mvirtualization[39m[38;5;12m [39m[38;5;12mtechnology[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m
|
||||
[38;5;12msecond[39m[38;5;12m [39m[38;5;12mlayer[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mdefense.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPrincipal[0m[38;5;14m[1m [0m[38;5;14m[1mMapper[0m[38;5;14m[1m [0m[38;5;14m[1m(PMapper)[0m[38;5;12m [39m[38;5;12m(https://github.com/nccgroup/PMapper)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mQuickly[39m[38;5;12m [39m[38;5;12mevaluate[39m[38;5;12m [39m[38;5;12mIAM[39m[38;5;12m [39m[38;5;12mpermissions[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12mvia[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mlibrary[39m[38;5;12m [39m[38;5;12mcapable[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12midentifying[39m[38;5;12m [39m[38;5;12mrisks[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mconfiguration[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12mIdentity[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mAccess[39m[38;5;12m [39m[38;5;12mManagement[39m[38;5;12m [39m[38;5;12m(IAM)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mAWS[39m
|
||||
[38;5;12maccount[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12morganization.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFalco[0m[38;5;12m (https://falco.org/) - Behavioral activity monitor designed to detect anomalous activity in containerized applications, hosts, and network packet flows by auditing the Linux kernel and enriched by runtime data such as Kubernetes metrics.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mKata[0m[38;5;14m[1m [0m[38;5;14m[1mContainers[0m[38;5;12m [39m[38;5;12m(https://katacontainers.io/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSecure[39m[38;5;12m [39m[38;5;12mcontainer[39m[38;5;12m [39m[38;5;12mruntime[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mlightweight[39m[38;5;12m [39m[38;5;12mvirtual[39m[38;5;12m [39m[38;5;12mmachines[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mfeel[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m[38;5;12mlike[39m[38;5;12m [39m[38;5;12mcontainers,[39m[38;5;12m [39m[38;5;12mbut[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12mstronger[39m[38;5;12m [39m[38;5;12mworkload[39m[38;5;12m [39m[38;5;12misolation[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mhardware[39m[38;5;12m [39m[38;5;12mvirtualization[39m[38;5;12m [39m[38;5;12mtechnology[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msecond[39m[38;5;12m [39m[38;5;12mlayer[39m[38;5;12m [39m
|
||||
[38;5;12mof[39m[38;5;12m [39m[38;5;12mdefense.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPrincipal[0m[38;5;14m[1m [0m[38;5;14m[1mMapper[0m[38;5;14m[1m [0m[38;5;14m[1m(PMapper)[0m[38;5;12m [39m[38;5;12m(https://github.com/nccgroup/PMapper)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mQuickly[39m[38;5;12m [39m[38;5;12mevaluate[39m[38;5;12m [39m[38;5;12mIAM[39m[38;5;12m [39m[38;5;12mpermissions[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12mvia[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mlibrary[39m[38;5;12m [39m[38;5;12mcapable[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12midentifying[39m[38;5;12m [39m[38;5;12mrisks[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mconfiguration[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12mIdentity[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mAccess[39m[38;5;12m [39m[38;5;12mManagement[39m[38;5;12m [39m[38;5;12m(IAM)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12maccount[39m[38;5;12m [39m
|
||||
[38;5;12mor[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mAWS[39m[38;5;12m [39m[38;5;12morganization.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mProwler[0m[38;5;12m (https://github.com/toniblyx/prowler) - Tool based on AWS-CLI commands for Amazon Web Services account security assessment and hardening.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mScout Suite[0m[38;5;12m (https://github.com/nccgroup/ScoutSuite) - Open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mgVisor[0m[38;5;12m (https://github.com/google/gvisor) - Application kernel, written in Go, that implements a substantial portion of the Linux system surface to provide an isolation boundary between the application and the host kernel.[39m
|
||||
@@ -115,8 +114,8 @@
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mCortex[0m[38;5;12m (https://cortexmetrics.io/) - Provides horizontally scalable, highly available, multi-tenant, long term storage for Prometheus.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mJaeger[0m[38;5;12m (https://www.jaegertracing.io/) - Distributed tracing platform backend used for monitoring and troubleshooting microservices-based distributed systems.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mOpenTelemetry[0m[38;5;12m [39m[38;5;12m(https://opentelemetry.io/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mObservability[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mcloud-native[39m[38;5;12m [39m[38;5;12msoftware,[39m[38;5;12m [39m[38;5;12mcomprising[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcollection[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtools,[39m[38;5;12m [39m[38;5;12mAPIs,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSDKs[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mexporting[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mperformance[39m[38;5;12m [39m[38;5;12mmetrics[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mtracing[39m[38;5;12m [39m[38;5;12mbackend[39m[38;5;12m [39m[38;5;12m(formerly[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mby[39m
|
||||
[38;5;12mthe[39m[38;5;12m [39m[38;5;12mOpenTracing[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mOpenCensus[39m[38;5;12m [39m[38;5;12mprojects).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mOpenTelemetry[0m[38;5;12m [39m[38;5;12m(https://opentelemetry.io/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mObservability[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mcloud-native[39m[38;5;12m [39m[38;5;12msoftware,[39m[38;5;12m [39m[38;5;12mcomprising[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcollection[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtools,[39m[38;5;12m [39m[38;5;12mAPIs,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSDKs[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mexporting[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mperformance[39m[38;5;12m [39m[38;5;12mmetrics[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mtracing[39m[38;5;12m [39m[38;5;12mbackend[39m[38;5;12m [39m[38;5;12m(formerly[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m
|
||||
[38;5;12mOpenTracing[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mOpenCensus[39m[38;5;12m [39m[38;5;12mprojects).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPrometheus[0m[38;5;12m (https://prometheus.io/) - Open-source systems monitoring and alerting toolkit originally built at SoundCloud.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mZipkin[0m[38;5;12m (https://zipkin.io/) - Distributed tracing system backend that helps gather timing data needed to troubleshoot latency problems in service architectures.[39m
|
||||
|
||||
@@ -127,8 +126,8 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mKubeSec[0m[38;5;12m (https://kubesec.io/) - Static analyzer of Kubernetes manifests that can be run locally, as a Kuberenetes admission controller, or as its own cloud service.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mKyverno[0m[38;5;12m (https://kyverno.io/) - Policy engine designed for Kubernetes.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mLinkerd[0m[38;5;12m (https://linkerd.io/) - Ultra light Kubernetes-specific service mesh that adds observability, reliability, and security to Kubernetes applications without requiring any modification of the application itself.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mManaged[0m[38;5;14m[1m [0m[38;5;14m[1mKubernetes[0m[38;5;14m[1m [0m[38;5;14m[1mInspection[0m[38;5;14m[1m [0m[38;5;14m[1mTool[0m[38;5;14m[1m [0m[38;5;14m[1m(MKIT)[0m[38;5;12m [39m[38;5;12m(https://github.com/darkbitio/mkit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mQuery[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mvalidate[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12msecurity-related[39m[38;5;12m [39m[38;5;12mconfiguration[39m[38;5;12m [39m[38;5;12msettings[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mmanaged[39m[38;5;12m [39m[38;5;12mKubernetes[39m[38;5;12m [39m[38;5;12mcluster[39m[38;5;12m [39m[38;5;12mobjects[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mworkloads/resources[39m[38;5;12m [39m[38;5;12mrunning[39m[38;5;12m [39m[38;5;12minside[39m
|
||||
[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcluster.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mManaged[0m[38;5;14m[1m [0m[38;5;14m[1mKubernetes[0m[38;5;14m[1m [0m[38;5;14m[1mInspection[0m[38;5;14m[1m [0m[38;5;14m[1mTool[0m[38;5;14m[1m [0m[38;5;14m[1m(MKIT)[0m[38;5;12m [39m[38;5;12m(https://github.com/darkbitio/mkit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mQuery[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mvalidate[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12msecurity-related[39m[38;5;12m [39m[38;5;12mconfiguration[39m[38;5;12m [39m[38;5;12msettings[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mmanaged[39m[38;5;12m [39m[38;5;12mKubernetes[39m[38;5;12m [39m[38;5;12mcluster[39m[38;5;12m [39m[38;5;12mobjects[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mworkloads/resources[39m[38;5;12m [39m[38;5;12mrunning[39m[38;5;12m [39m[38;5;12minside[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m
|
||||
[38;5;12mcluster.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPolaris[0m[38;5;12m (https://polaris.docs.fairwinds.com/) - Validates Kubernetes best practices by running tests against code commits, a Kubernetes admission request, or live resources already running in a cluster. [39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSealed Secrets[0m[38;5;12m (https://github.com/bitnami-labs/sealed-secrets) - Kubernetes controller and tool for one-way encrypted Secrets.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mcertificate-expiry-monitor[0m[38;5;12m (https://github.com/muxinc/certificate-expiry-monitor) - Utility that exposes the expiry of TLS certificates as Prometheus metrics.[39m
|
||||
@@ -141,8 +140,8 @@
|
||||
|
||||
[38;5;12mSee also [39m[38;5;14m[1mServiceMesh.es[0m[38;5;12m (https://servicemesh.es/).[39m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mConsul[0m[38;5;12m [39m[38;5;12m(https://consul.io/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSolution[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mconnect[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mconfigure[39m[38;5;12m [39m[38;5;12mapplications[39m[38;5;12m [39m[38;5;12macross[39m[38;5;12m [39m[38;5;12mdynamic,[39m[38;5;12m [39m[38;5;12mdistributed[39m[38;5;12m [39m[38;5;12minfrastructure[39m[38;5;12m [39m[38;5;12mand,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mConsul[39m[38;5;12m [39m[38;5;12mConnect,[39m[38;5;12m [39m[38;5;12menabling[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12mservice-to-service[39m[38;5;12m [39m[38;5;12mcommunication[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mautomatic[39m[38;5;12m [39m[38;5;12mTLS[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12midentity-based[39m[38;5;12m [39m[38;5;12mauthorization.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mConsul[0m[38;5;12m [39m[38;5;12m(https://consul.io/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSolution[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mconnect[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mconfigure[39m[38;5;12m [39m[38;5;12mapplications[39m[38;5;12m [39m[38;5;12macross[39m[38;5;12m [39m[38;5;12mdynamic,[39m[38;5;12m [39m[38;5;12mdistributed[39m[38;5;12m [39m[38;5;12minfrastructure[39m[38;5;12m [39m[38;5;12mand,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mConsul[39m[38;5;12m [39m[38;5;12mConnect,[39m[38;5;12m [39m[38;5;12menabling[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12mservice-to-service[39m[38;5;12m [39m[38;5;12mcommunication[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mautomatic[39m[38;5;12m [39m[38;5;12mTLS[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12midentity-based[39m[38;5;12m [39m
|
||||
[38;5;12mauthorization.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mIstio[0m[38;5;12m (https://istio.io/) - Open platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data.[39m
|
||||
|
||||
[38;2;255;187;0m[4mCommunications security (COMSEC)[0m
|
||||
@@ -150,8 +149,8 @@
|
||||
[38;5;12mSee also [39m[38;5;14m[1mTransport-layer defenses[0m[38;5;12m (#transport-layer-defenses).[39m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mGPG Sync[0m[38;5;12m (https://github.com/firstlookmedia/gpgsync) - Centralize and automate OpenPGP public key distribution, revocation, and updates amongst all members of an organization or team.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGeneva[0m[38;5;14m[1m [0m[38;5;14m[1m(Genetic[0m[38;5;14m[1m [0m[38;5;14m[1mEvasion)[0m[38;5;12m [39m[38;5;12m(https://censorship.ai/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mNovel[39m[38;5;12m [39m[38;5;12mexperimental[39m[38;5;12m [39m[38;5;12mgenetic[39m[38;5;12m [39m[38;5;12malgorithm[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mevolves[39m[38;5;12m [39m[38;5;12mpacket-manipulation-based[39m[38;5;12m [39m[38;5;12mcensorship[39m[38;5;12m [39m[38;5;12mevasion[39m[38;5;12m [39m[38;5;12mstrategies[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mnation-state[39m[38;5;12m [39m[38;5;12mlevel[39m[38;5;12m [39m[38;5;12mcensors[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mincrease[39m[38;5;12m [39m[38;5;12mavailability[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12motherwise[39m[38;5;12m [39m
|
||||
[38;5;12mblocked[39m[38;5;12m [39m[38;5;12mcontent.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGeneva[0m[38;5;14m[1m [0m[38;5;14m[1m(Genetic[0m[38;5;14m[1m [0m[38;5;14m[1mEvasion)[0m[38;5;12m [39m[38;5;12m(https://censorship.ai/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mNovel[39m[38;5;12m [39m[38;5;12mexperimental[39m[38;5;12m [39m[38;5;12mgenetic[39m[38;5;12m [39m[38;5;12malgorithm[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mevolves[39m[38;5;12m [39m[38;5;12mpacket-manipulation-based[39m[38;5;12m [39m[38;5;12mcensorship[39m[38;5;12m [39m[38;5;12mevasion[39m[38;5;12m [39m[38;5;12mstrategies[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mnation-state[39m[38;5;12m [39m[38;5;12mlevel[39m[38;5;12m [39m[38;5;12mcensors[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mincrease[39m[38;5;12m [39m[38;5;12mavailability[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12motherwise[39m[38;5;12m [39m[38;5;12mblocked[39m[38;5;12m [39m
|
||||
[38;5;12mcontent.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGlobaLeaks[0m[38;5;12m (https://www.globaleaks.org/) - Free, open source software enabling anyone to easily set up and maintain a secure whistleblowing platform.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSecureDrop[0m[38;5;12m (https://securedrop.org/) - Open source whistleblower submission system that media organizations and NGOs can install to securely accept documents from anonymous sources.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mTeleport[0m[38;5;12m (https://goteleport.com/) - Allows engineers and security professionals to unify access for SSH servers, Kubernetes clusters, web applications, and databases across all environments.[39m
|
||||
@@ -235,8 +234,7 @@
|
||||
[38;2;255;187;0m[4mTarpits[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mEndlessh[0m[38;5;12m (https://github.com/skeeto/endlessh) - SSH tarpit that slowly sends an endless banner.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mLaBrea[0m[38;5;12m [39m[38;5;12m(http://labrea.sourceforge.net/labrea-info.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mProgram[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12manswers[39m[38;5;12m [39m[38;5;12mARP[39m[38;5;12m [39m[38;5;12mrequests[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12munused[39m[38;5;12m [39m[38;5;12mIP[39m[38;5;12m [39m[38;5;12mspace,[39m[38;5;12m [39m[38;5;12mcreating[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mappearance[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mfake[39m[38;5;12m [39m[38;5;12mmachines[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12manswer[39m[38;5;12m [39m[38;5;12mfurther[39m[38;5;12m [39m[38;5;12mrequests[39m[38;5;12m [39m[38;5;12mvery[39m[38;5;12m [39m[38;5;12mslowly[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mslow[39m[38;5;12m [39m[38;5;12mdown[39m[38;5;12m [39m[38;5;12mscanners,[39m[38;5;12m [39m[38;5;12mworms,[39m[38;5;12m [39m
|
||||
[38;5;12metcetera.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mLaBrea[0m[38;5;12m (http://labrea.sourceforge.net/labrea-info.html) - Program that answers ARP requests for unused IP space, creating the appearance of fake machines that answer further requests very slowly in order to slow down scanners, worms, etcetera.[39m
|
||||
|
||||
[38;2;255;187;0m[4mHost-based tools[0m
|
||||
|
||||
@@ -284,8 +282,8 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mOSXCollector[0m[38;5;12m (https://github.com/Yelp/osxcollector) - Forensic evidence collection & analysis toolkit for macOS.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mir-rescue[0m[38;5;12m (https://github.com/diogo-fernan/ir-rescue) - Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMargarita Shotgun[0m[38;5;12m (https://github.com/ThreatResponse/margaritashotgun) - Command line utility (that works with or without Amazon EC2 instances) to parallelize remote memory acquisition.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mUntitled[0m[38;5;14m[1m [0m[38;5;14m[1mGoose[0m[38;5;14m[1m [0m[38;5;14m[1mTool[0m[38;5;12m [39m[38;5;12m(https://github.com/cisagov/untitledgoosetool)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAssists[39m[38;5;12m [39m[38;5;12mincident[39m[38;5;12m [39m[38;5;12mresponse[39m[38;5;12m [39m[38;5;12mteams[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mexporting[39m[38;5;12m [39m[38;5;12mcloud[39m[38;5;12m [39m[38;5;12martifacts[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mAzure/AzureAD/M365[39m[38;5;12m [39m[38;5;12menvironments[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mrun[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfull[39m[38;5;12m [39m[38;5;12minvestigation[39m[38;5;12m [39m[38;5;12mdespite[39m[38;5;12m [39m[38;5;12mlacking[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mlogs[39m[38;5;12m [39m
|
||||
[38;5;12mingested[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mSIEM.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mUntitled[0m[38;5;14m[1m [0m[38;5;14m[1mGoose[0m[38;5;14m[1m [0m[38;5;14m[1mTool[0m[38;5;12m [39m[38;5;12m(https://github.com/cisagov/untitledgoosetool)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAssists[39m[38;5;12m [39m[38;5;12mincident[39m[38;5;12m [39m[38;5;12mresponse[39m[38;5;12m [39m[38;5;12mteams[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mexporting[39m[38;5;12m [39m[38;5;12mcloud[39m[38;5;12m [39m[38;5;12martifacts[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mAzure/AzureAD/M365[39m[38;5;12m [39m[38;5;12menvironments[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mrun[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfull[39m[38;5;12m [39m[38;5;12minvestigation[39m[38;5;12m [39m[38;5;12mdespite[39m[38;5;12m [39m[38;5;12mlacking[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mlogs[39m[38;5;12m [39m[38;5;12mingested[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m
|
||||
[38;5;12mSIEM.[39m
|
||||
|
||||
[38;2;255;187;0m[4mNetwork perimeter defenses[0m
|
||||
|
||||
@@ -304,9 +302,9 @@
|
||||
[38;2;255;187;0m[4mOperating System distributions[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mComputer Aided Investigative Environment (CAINE)[0m[38;5;12m (https://caine-live.net/) - Italian GNU/Linux live distribution that pre-packages numerous digital forensics and evidence collection tools.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSecurity Onion[0m[38;5;12m (https://securityonion.net/) - Free and open source GNU/Linux distribution for intrusion detection, enterprise security monitoring, and log management.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mQubes[0m[38;5;14m[1m [0m[38;5;14m[1mOS[0m[38;5;12m [39m[38;5;12m(https://qubes-os.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mDesktop[39m[38;5;12m [39m[38;5;12menvironment[39m[38;5;12m [39m[38;5;12mbuilt[39m[38;5;12m [39m[38;5;12matop[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mXen[39m[38;5;12m [39m[38;5;12mhypervisor[39m[38;5;12m [39m[38;5;12mproject[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mruns[39m[38;5;12m [39m[38;5;12meach[39m[38;5;12m [39m[38;5;12mend-user[39m[38;5;12m [39m[38;5;12mprogram[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mits[39m[38;5;12m [39m[38;5;12mown[39m[38;5;12m [39m[38;5;12mvirtual[39m[38;5;12m [39m[38;5;12mmachine[39m[38;5;12m [39m[38;5;12mintended[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12mstrict[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mcontrols[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mconstrain[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mreach[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12many[39m[38;5;12m [39m
|
||||
[38;5;12msuccessful[39m[38;5;12m [39m[38;5;12mmalware[39m[38;5;12m [39m[38;5;12mexploit.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSecurity Onion[0m[38;5;12m (https://securityonionsolutions.com/) - Free and open source GNU/Linux distribution for intrusion detection, enterprise security monitoring, and log management.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mQubes[0m[38;5;14m[1m [0m[38;5;14m[1mOS[0m[38;5;12m [39m[38;5;12m(https://qubes-os.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mDesktop[39m[38;5;12m [39m[38;5;12menvironment[39m[38;5;12m [39m[38;5;12mbuilt[39m[38;5;12m [39m[38;5;12matop[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mXen[39m[38;5;12m [39m[38;5;12mhypervisor[39m[38;5;12m [39m[38;5;12mproject[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mruns[39m[38;5;12m [39m[38;5;12meach[39m[38;5;12m [39m[38;5;12mend-user[39m[38;5;12m [39m[38;5;12mprogram[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mits[39m[38;5;12m [39m[38;5;12mown[39m[38;5;12m [39m[38;5;12mvirtual[39m[38;5;12m [39m[38;5;12mmachine[39m[38;5;12m [39m[38;5;12mintended[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12mstrict[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mcontrols[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mconstrain[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mreach[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12many[39m[38;5;12m [39m[38;5;12msuccessful[39m[38;5;12m [39m
|
||||
[38;5;12mmalware[39m[38;5;12m [39m[38;5;12mexploit.[39m
|
||||
|
||||
[38;2;255;187;0m[4mPhishing awareness and reporting[0m
|
||||
|
||||
@@ -328,19 +326,16 @@
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mAPTSimulator[0m[38;5;12m (https://github.com/NextronSystems/APTSimulator) - Toolset to make a system look as if it was the victim of an APT attack.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mAtomic Red Team[0m[38;5;12m (https://atomicredteam.io/) - Library of simple, automatable tests to execute for testing security controls.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mBadBlood[0m[38;5;12m [39m[38;5;12m(https://www.secframe.com/badblood/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mFills[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mtest[39m[38;5;12m [39m[38;5;12m(non-production)[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12mDomain[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12menables[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12manalysts[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mengineers[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mpractice[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mgain[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12munderstanding[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mprescribe[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msecuring[39m[38;5;12m [39m[38;5;12mActive[39m[38;5;12m [39m
|
||||
[38;5;12mDirectory.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mBadBlood[0m[38;5;12m (https://www.secframe.com/badblood/) - Fills a test (non-production) Windows Domain with data that enables security analysts and engineers to practice using tools to gain an understanding and prescribe to securing Active Directory.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCaldera[0m[38;5;12m (https://caldera.mitre.org/) - Scalable, automated, and extensible adversary emulation platform developed by MITRE.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDrool[0m[38;5;12m (https://www.dns-oarc.net/tools/drool) - Replay DNS traffic from packet capture files and send it to a specified server, such as for simulating DDoS attacks on the DNS and measuring normal DNS querying.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDumpsterFire[0m[38;5;12m (https://github.com/TryCatchHCF/DumpsterFire) - Modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events for Blue Team drills and sensor/alert mapping.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mInfection[0m[38;5;14m[1m [0m[38;5;14m[1mMonkey[0m[38;5;12m [39m[38;5;12m(https://www.guardicore.com/infectionmonkey/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOpen-source[39m[38;5;12m [39m[38;5;12mbreach[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12msimulation[39m[38;5;12m [39m[38;5;12m(BAS)[39m[38;5;12m [39m[38;5;12mplatform[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mhelps[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mvalidate[39m[38;5;12m [39m[38;5;12mexisting[39m[38;5;12m [39m[38;5;12mcontrols[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12midentify[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mattackers[39m[38;5;12m [39m[38;5;12mmight[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mcurrent[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m
|
||||
[38;5;12mgaps.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mInfection Monkey[0m[38;5;12m (https://www.guardicore.com/infectionmonkey/) - Open-source breach and attack simulation (BAS) platform that helps you validate existing controls and identify how attackers might exploit your current network security gaps.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMetta[0m[38;5;12m (https://github.com/uber-common/metta) - Automated information security preparedness tool to do adversarial simulation.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mNetwork Flight Simulator ([0m[48;5;235m[38;5;249m[1mflightsim[0m[38;5;14m[1m)[0m[38;5;12m (https://github.com/alphasoc/flightsim) - Utility to generate malicious network traffic and help security teams evaluate security controls and audit their network visibility.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRedHunt OS[0m[38;5;12m (https://github.com/redhuntlabs/RedHunt-OS) - Ubuntu-based Open Virtual Appliance ([39m[48;5;235m[38;5;249m.ova[49m[39m[38;5;12m) preconfigured with several threat emulation tools as well as a defender's toolkit.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mStratus Red Team[0m[38;5;12m (https://stratus-red-team.cloud/) - Emulate offensive attack techniques in a granular and self-contained manner against a cloud environment; think "Atomic Red Team™ for the cloud."[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mtcpreplay[0m[38;5;12m [39m[38;5;12m(https://tcpreplay.appneta.com/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSuite[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12mOpen[39m[38;5;12m [39m[38;5;12mSource[39m[38;5;12m [39m[38;5;12mutilities[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mediting[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mreplaying[39m[38;5;12m [39m[38;5;12mpreviously[39m[38;5;12m [39m[38;5;12mcaptured[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mtraffic[39m[38;5;12m [39m[38;5;12moriginally[39m[38;5;12m [39m[38;5;12mdesigned[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mreplay[39m[38;5;12m [39m[38;5;12mmalicious[39m[38;5;12m [39m[38;5;12mtraffic[39m[38;5;12m [39m[38;5;12mpatterns[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mIntrusion[39m[38;5;12m [39m[38;5;12mDetection/Prevention[39m[38;5;12m [39m
|
||||
[38;5;12mSystems.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mtcpreplay[0m[38;5;12m (https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic originally designed to replay malicious traffic patterns to Intrusion Detection/Prevention Systems.[39m
|
||||
|
||||
[38;2;255;187;0m[4mPost-engagement analysis and reporting[0m
|
||||
|
||||
@@ -380,15 +375,15 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mVAST[0m[38;5;12m (https://github.com/tenzir/vast) - Free and open-source network telemetry engine for data-driven security investigations.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWireshark[0m[38;5;12m (https://www.wireshark.org) - Free and open-source packet analyzer useful for network troubleshooting or forensic netflow analysis.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mZeek[0m[38;5;12m (https://zeek.org/) - Powerful network analysis framework focused on security monitoring, formerly known as Bro.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mnetsniff-ng[0m[38;5;12m [39m[38;5;12m(http://netsniff-ng.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mfast[39m[38;5;12m [39m[38;5;12mGNU/Linux[39m[38;5;12m [39m[38;5;12mnetworking[39m[38;5;12m [39m[38;5;12mtoolkit[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mnumerous[39m[38;5;12m [39m[38;5;12mutilities[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mconnection[39m[38;5;12m [39m[38;5;12mtracking[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12m([39m[48;5;235m[38;5;249mflowtop[49m[39m[38;5;12m),[39m[38;5;12m [39m[38;5;12mtraffic[39m[38;5;12m [39m[38;5;12mgenerator[39m[38;5;12m [39m[38;5;12m([39m[48;5;235m[38;5;249mtrafgen[49m[39m[38;5;12m),[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mautonomous[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12m(AS)[39m[38;5;12m [39m[38;5;12mtrace[39m[38;5;12m [39m[38;5;12mroute[39m[38;5;12m [39m[38;5;12mutility[39m[38;5;12m [39m[38;5;12m([39m
|
||||
[48;5;235m[38;5;249mastraceroute[49m[39m[38;5;12m).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mnetsniff-ng[0m[38;5;12m [39m[38;5;12m(http://netsniff-ng.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mfast[39m[38;5;12m [39m[38;5;12mGNU/Linux[39m[38;5;12m [39m[38;5;12mnetworking[39m[38;5;12m [39m[38;5;12mtoolkit[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mnumerous[39m[38;5;12m [39m[38;5;12mutilities[39m[38;5;12m [39m[38;5;12msuch[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mconnection[39m[38;5;12m [39m[38;5;12mtracking[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12m([39m[48;5;235m[38;5;249mflowtop[49m[39m[38;5;12m),[39m[38;5;12m [39m[38;5;12mtraffic[39m[38;5;12m [39m[38;5;12mgenerator[39m[38;5;12m [39m[38;5;12m([39m[48;5;235m[38;5;249mtrafgen[49m[39m[38;5;12m),[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mautonomous[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12m(AS)[39m[38;5;12m [39m[38;5;12mtrace[39m[38;5;12m [39m[38;5;12mroute[39m[38;5;12m [39m[38;5;12mutility[39m[38;5;12m [39m[38;5;12m([39m[48;5;235m[38;5;249mastraceroute[49m[39m
|
||||
[38;5;12m).[39m
|
||||
|
||||
[38;2;255;187;0m[4mSecurity Information and Event Management (SIEM)[0m
|
||||
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mAlienVault[0m[38;5;14m[1m [0m[38;5;14m[1mOSSIM[0m[38;5;12m [39m[38;5;12m(https://www.alienvault.com/open-threat-exchange/projects)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSingle-server[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12mSIEM[39m[38;5;12m [39m[38;5;12mplatform[39m[38;5;12m [39m[38;5;12mfeaturing[39m[38;5;12m [39m[38;5;12masset[39m[38;5;12m [39m[38;5;12mdiscovery,[39m[38;5;12m [39m[38;5;12masset[39m[38;5;12m [39m[38;5;12minventorying,[39m[38;5;12m [39m[38;5;12mbehavioral[39m[38;5;12m [39m[38;5;12mmonitoring,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mevent[39m[38;5;12m [39m[38;5;12mcorrelation,[39m[38;5;12m [39m[38;5;12mdriven[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mAlienVault[39m[38;5;12m [39m
|
||||
[38;5;12mOpen[39m[38;5;12m [39m[38;5;12mThreat[39m[38;5;12m [39m[38;5;12mExchange[39m[38;5;12m [39m[38;5;12m(OTX).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPrelude[0m[38;5;14m[1m [0m[38;5;14m[1mSIEM[0m[38;5;14m[1m [0m[38;5;14m[1mOSS[0m[38;5;12m [39m[38;5;12m(https://www.prelude-siem.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOpen[39m[38;5;12m [39m[38;5;12msource,[39m[38;5;12m [39m[38;5;12magentless[39m[38;5;12m [39m[38;5;12mSIEM[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlong[39m[38;5;12m [39m[38;5;12mhistory[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12mcommercial[39m[38;5;12m [39m[38;5;12mvariants[39m[38;5;12m [39m[38;5;12mfeaturing[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mevent[39m[38;5;12m [39m[38;5;12mcollection,[39m[38;5;12m [39m[38;5;12mnormalization,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12malerting[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12marbitrary[39m[38;5;12m [39m[38;5;12mlog[39m[38;5;12m [39m[38;5;12minput[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mnumerous[39m[38;5;12m [39m
|
||||
[38;5;12mpopular[39m[38;5;12m [39m[38;5;12mmonitoring[39m[38;5;12m [39m[38;5;12mtools.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mAlienVault[0m[38;5;14m[1m [0m[38;5;14m[1mOSSIM[0m[38;5;12m [39m[38;5;12m(https://www.alienvault.com/open-threat-exchange/projects)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSingle-server[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12mSIEM[39m[38;5;12m [39m[38;5;12mplatform[39m[38;5;12m [39m[38;5;12mfeaturing[39m[38;5;12m [39m[38;5;12masset[39m[38;5;12m [39m[38;5;12mdiscovery,[39m[38;5;12m [39m[38;5;12masset[39m[38;5;12m [39m[38;5;12minventorying,[39m[38;5;12m [39m[38;5;12mbehavioral[39m[38;5;12m [39m[38;5;12mmonitoring,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mevent[39m[38;5;12m [39m[38;5;12mcorrelation,[39m[38;5;12m [39m[38;5;12mdriven[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mAlienVault[39m[38;5;12m [39m[38;5;12mOpen[39m[38;5;12m [39m[38;5;12mThreat[39m[38;5;12m [39m
|
||||
[38;5;12mExchange[39m[38;5;12m [39m[38;5;12m(OTX).[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPrelude[0m[38;5;14m[1m [0m[38;5;14m[1mSIEM[0m[38;5;14m[1m [0m[38;5;14m[1mOSS[0m[38;5;12m [39m[38;5;12m(https://www.prelude-siem.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOpen[39m[38;5;12m [39m[38;5;12msource,[39m[38;5;12m [39m[38;5;12magentless[39m[38;5;12m [39m[38;5;12mSIEM[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlong[39m[38;5;12m [39m[38;5;12mhistory[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mseveral[39m[38;5;12m [39m[38;5;12mcommercial[39m[38;5;12m [39m[38;5;12mvariants[39m[38;5;12m [39m[38;5;12mfeaturing[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mevent[39m[38;5;12m [39m[38;5;12mcollection,[39m[38;5;12m [39m[38;5;12mnormalization,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12malerting[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12marbitrary[39m[38;5;12m [39m[38;5;12mlog[39m[38;5;12m [39m[38;5;12minput[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mnumerous[39m[38;5;12m [39m[38;5;12mpopular[39m[38;5;12m [39m
|
||||
[38;5;12mmonitoring[39m[38;5;12m [39m[38;5;12mtools.[39m
|
||||
|
||||
[38;2;255;187;0m[4mService and performance monitoring[0m
|
||||
|
||||
@@ -409,8 +404,8 @@
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mCimSweep[0m[38;5;12m (https://github.com/PowerShellMafia/CimSweep) - Suite of CIM/WMI-based tools enabling remote incident response and hunting operations across all versions of Windows.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDeepBlueCLI[0m[38;5;12m (https://github.com/sans-blue-team/DeepBlueCLI) - PowerShell module for hunt teaming via Windows Event logs.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGRR[0m[38;5;14m[1m [0m[38;5;14m[1mRapid[0m[38;5;14m[1m [0m[38;5;14m[1mResponse[0m[38;5;12m [39m[38;5;12m(https://github.com/google/grr)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIncident[39m[38;5;12m [39m[38;5;12mresponse[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mfocused[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mremote[39m[38;5;12m [39m[38;5;12mlive[39m[38;5;12m [39m[38;5;12mforensics[39m[38;5;12m [39m[38;5;12mconsisting[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mPython[39m[38;5;12m [39m[38;5;12magent[39m[38;5;12m [39m[38;5;12minstalled[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12massets[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mPython-based[39m[38;5;12m [39m[38;5;12mserver[39m[38;5;12m [39m[38;5;12minfrastructure[39m[38;5;12m [39m[38;5;12menabling[39m[38;5;12m [39m[38;5;12manalysts[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m
|
||||
[38;5;12mtriage[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m[38;5;12manalysis[39m[38;5;12m [39m[38;5;12mremotely.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGRR[0m[38;5;14m[1m [0m[38;5;14m[1mRapid[0m[38;5;14m[1m [0m[38;5;14m[1mResponse[0m[38;5;12m [39m[38;5;12m(https://github.com/google/grr)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIncident[39m[38;5;12m [39m[38;5;12mresponse[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mfocused[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mremote[39m[38;5;12m [39m[38;5;12mlive[39m[38;5;12m [39m[38;5;12mforensics[39m[38;5;12m [39m[38;5;12mconsisting[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mPython[39m[38;5;12m [39m[38;5;12magent[39m[38;5;12m [39m[38;5;12minstalled[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12massets[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mPython-based[39m[38;5;12m [39m[38;5;12mserver[39m[38;5;12m [39m[38;5;12minfrastructure[39m[38;5;12m [39m[38;5;12menabling[39m[38;5;12m [39m[38;5;12manalysts[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12mtriage[39m[38;5;12m [39m
|
||||
[38;5;12mattacks[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m[38;5;12manalysis[39m[38;5;12m [39m[38;5;12mremotely.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHunting ELK (HELK)[0m[38;5;12m (https://github.com/Cyb3rWard0g/HELK) - All-in-one Free Software threat hunting stack based on Elasticsearch, Logstash, Kafka, and Kibana with various built-in integrations for analytics including Jupyter Notebook.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mLogging Made Easy (LME)[0m[38;5;12m (https://www.cisa.gov/resources-tools/services/logging-made-easy) - Free and open logging and protective monitoring solution serving.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMozDef[0m[38;5;12m (https://github.com/mozilla/MozDef) - Automate the security incident handling process and facilitate the real-time activities of incident handlers.[39m
|
||||
@@ -427,8 +422,8 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mAttackerKB[0m[38;5;12m (https://attackerkb.com/) - Free and public crowdsourced vulnerability assessment platform to help prioritize high-risk patch application and combat vulnerability fatigue.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDATA[0m[38;5;12m (https://github.com/hadojae/DATA) - Credential phish analysis and automation tool that can accept suspected phishing URLs directly or trigger on observed network traffic containing such a URL.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mForager[0m[38;5;12m (https://github.com/opensourcesec/Forager) - Multi-threaded threat intelligence gathering built with Python3 featuring simple text-based configuration and data storage for ease of use and data portability.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGRASSMARLIN[0m[38;5;12m [39m[38;5;12m(https://github.com/nsacyber/GRASSMARLIN)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mProvides[39m[38;5;12m [39m[38;5;12mIP[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12msituational[39m[38;5;12m [39m[38;5;12mawareness[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mindustrial[39m[38;5;12m [39m[38;5;12mcontrol[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12m(ICS)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSupervisory[39m[38;5;12m [39m[38;5;12mControl[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mData[39m[38;5;12m [39m[38;5;12mAcquisition[39m[38;5;12m [39m[38;5;12m(SCADA)[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mpassively[39m[38;5;12m [39m[38;5;12mmapping,[39m[38;5;12m [39m[38;5;12maccounting[39m[38;5;12m [39m[38;5;12mfor,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mreporting[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mICS/SCADA[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mtopology[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mendpoints.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGRASSMARLIN[0m[38;5;12m [39m[38;5;12m(https://github.com/nsacyber/GRASSMARLIN)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mProvides[39m[38;5;12m [39m[38;5;12mIP[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12msituational[39m[38;5;12m [39m[38;5;12mawareness[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mindustrial[39m[38;5;12m [39m[38;5;12mcontrol[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12m(ICS)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSupervisory[39m[38;5;12m [39m[38;5;12mControl[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mData[39m[38;5;12m [39m[38;5;12mAcquisition[39m[38;5;12m [39m[38;5;12m(SCADA)[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mpassively[39m[38;5;12m [39m[38;5;12mmapping,[39m[38;5;12m [39m[38;5;12maccounting[39m[38;5;12m [39m[38;5;12mfor,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mreporting[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m
|
||||
[38;5;12myour[39m[38;5;12m [39m[38;5;12mICS/SCADA[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mtopology[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mendpoints.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMLSec Combine[0m[38;5;12m (https://github.com/mlsecproject/combine) - Gather and combine multiple threat intelligence feed sources into one customizable, standardized CSV-based format.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMalware Information Sharing Platform and Threat Sharing (MISP)[0m[38;5;12m (https://misp-project.org/) - Open source software solution for collecting, storing, distributing and sharing cyber security indicators.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mOpen Source Vulnerabilities (OSV)[0m[38;5;12m (https://osv.dev/) - Vulnerability database and triage infrastructure for open source projects aimed at helping both open source maintainers and consumers of open source.[39m
|
||||
@@ -437,8 +432,7 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mThreatIngestor[0m[38;5;12m (https://github.com/InQuest/ThreatIngestor) - Extendable tool to extract and aggregate IOCs from threat feeds including Twitter, RSS feeds, or other sources.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mUnfetter[0m[38;5;12m (https://nsacyber.github.io/unfetter/) - Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mViper[0m[38;5;12m (https://github.com/viper-framework/viper) - Binary analysis and management framework enabling easy organization of malware and exploit samples.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mYARA[0m[38;5;12m [39m[38;5;12m(https://github.com/VirusTotal/yara)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mTool[39m[38;5;12m [39m[38;5;12maimed[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12m(but[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12mlimited[39m[38;5;12m [39m[38;5;12mto)[39m[38;5;12m [39m[38;5;12mhelping[39m[38;5;12m [39m[38;5;12mmalware[39m[38;5;12m [39m[38;5;12mresearchers[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12midentify[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mclassify[39m[38;5;12m [39m[38;5;12mmalware[39m[38;5;12m [39m[38;5;12msamples,[39m[38;5;12m [39m[38;5;12mdescribed[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12m"the[39m[38;5;12m [39m[38;5;12mpattern[39m[38;5;12m [39m[38;5;12mmatching[39m[38;5;12m [39m[38;5;12mswiss[39m[38;5;12m [39m[38;5;12marmy[39m[38;5;12m [39m[38;5;12mknife"[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mfile[39m[38;5;12m [39m[38;5;12mpatterns[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12msignatures.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mYARA[0m[38;5;12m (https://github.com/VirusTotal/yara) - Tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples, described as "the pattern matching swiss army knife" for file patterns and signatures.[39m
|
||||
|
||||
[38;2;255;187;0m[4mFingerprinting[0m
|
||||
|
||||
@@ -448,8 +442,8 @@
|
||||
[38;2;255;187;0m[4mThreat signature packages and collections[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mESET's Malware IoCs[0m[38;5;12m (https://github.com/eset/malware-ioc) - Indicators of Compromises (IOCs) derived from ESET's various investigations.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mFireEye's[0m[38;5;14m[1m [0m[38;5;14m[1mRed[0m[38;5;14m[1m [0m[38;5;14m[1mTeam[0m[38;5;14m[1m [0m[38;5;14m[1mTool[0m[38;5;14m[1m [0m[38;5;14m[1mCountermeasures[0m[38;5;12m [39m[38;5;12m(https://github.com/fireeye/red_team_tool_countermeasures)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mCollection[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mSnort[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mYARA[39m[38;5;12m [39m[38;5;12mrules[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdetect[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12mcarried[39m[38;5;12m [39m[38;5;12mout[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mFireEye's[39m[38;5;12m [39m[38;5;12mown[39m[38;5;12m [39m[38;5;12mRed[39m[38;5;12m [39m[38;5;12mTeam[39m[38;5;12m [39m[38;5;12mtools,[39m[38;5;12m [39m[38;5;12mfirst[39m[38;5;12m [39m[38;5;12mreleased[39m[38;5;12m [39m[38;5;12mafter[39m[38;5;12m [39m[38;5;12mFireEye[39m[38;5;12m [39m
|
||||
[38;5;12mdisclosed[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mbreach[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mDecember[39m[38;5;12m [39m[38;5;12m2020.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mFireEye's[0m[38;5;14m[1m [0m[38;5;14m[1mRed[0m[38;5;14m[1m [0m[38;5;14m[1mTeam[0m[38;5;14m[1m [0m[38;5;14m[1mTool[0m[38;5;14m[1m [0m[38;5;14m[1mCountermeasures[0m[38;5;12m [39m[38;5;12m(https://github.com/fireeye/red_team_tool_countermeasures)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mCollection[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mSnort[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mYARA[39m[38;5;12m [39m[38;5;12mrules[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdetect[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12mcarried[39m[38;5;12m [39m[38;5;12mout[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mFireEye's[39m[38;5;12m [39m[38;5;12mown[39m[38;5;12m [39m[38;5;12mRed[39m[38;5;12m [39m[38;5;12mTeam[39m[38;5;12m [39m[38;5;12mtools,[39m[38;5;12m [39m[38;5;12mfirst[39m[38;5;12m [39m[38;5;12mreleased[39m[38;5;12m [39m[38;5;12mafter[39m[38;5;12m [39m[38;5;12mFireEye[39m[38;5;12m [39m[38;5;12mdisclosed[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m
|
||||
[38;5;12mbreach[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mDecember[39m[38;5;12m [39m[38;5;12m2020.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFireEye's Sunburst Countermeasures[0m[38;5;12m (https://github.com/fireeye/sunburst_countermeasures) - Collection of IoC in various languages for detecting backdoored SolarWinds Orion NMS activities and related vulnerabilities.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mYARA Rules[0m[38;5;12m (https://github.com/Yara-Rules/rules) - Project covering the need for IT security researchers to have a single repository where different Yara signatures are compiled, classified and kept as up to date as possible.[39m
|
||||
|
||||
@@ -500,8 +494,8 @@
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSigcheck[0m[38;5;12m [39m[38;5;12m(https://docs.microsoft.com/en-us/sysinternals/downloads/sigcheck)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAudit[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12mhost's[39m[38;5;12m [39m[38;5;12mroot[39m[38;5;12m [39m[38;5;12mcertificate[39m[38;5;12m [39m[38;5;12mstore[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mMicrosoft's[39m[38;5;12m [39m[38;5;14m[1mCertificate[0m[38;5;14m[1m [0m[38;5;14m[1mTrust[0m[38;5;14m[1m [0m[38;5;14m[1mList[0m[38;5;14m[1m [0m[38;5;14m[1m(CTL)[0m[38;5;12m [39m
|
||||
[38;5;12m(https://docs.microsoft.com/en-us/windows/desktop/SecCrypto/certificate-trust-list-overview).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSticky Keys Slayer[0m[38;5;12m (https://github.com/linuz/Sticky-Keys-Slayer) - Establishes a Windows RDP session from a list of hostnames and scans for accessibility tools backdoors, alerting if one is discovered.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mWindows[0m[38;5;14m[1m [0m[38;5;14m[1mSecure[0m[38;5;14m[1m [0m[38;5;14m[1mHost[0m[38;5;14m[1m [0m[38;5;14m[1mBaseline[0m[38;5;12m [39m[38;5;12m(https://github.com/nsacyber/Windows-Secure-Host-Baseline)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGroup[39m[38;5;12m [39m[38;5;12mPolicy[39m[38;5;12m [39m[38;5;12mobjects,[39m[38;5;12m [39m[38;5;12mcompliance[39m[38;5;12m [39m[38;5;12mchecks,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mconfiguration[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mautomated[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mflexible[39m[38;5;12m [39m[38;5;12mapproach[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msecurely[39m[38;5;12m [39m[38;5;12mdeploying[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mmaintaining[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mlatest[39m[38;5;12m [39m[38;5;12mreleases[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12m10.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mWindows[0m[38;5;14m[1m [0m[38;5;14m[1mSecure[0m[38;5;14m[1m [0m[38;5;14m[1mHost[0m[38;5;14m[1m [0m[38;5;14m[1mBaseline[0m[38;5;12m [39m[38;5;12m(https://github.com/nsacyber/Windows-Secure-Host-Baseline)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGroup[39m[38;5;12m [39m[38;5;12mPolicy[39m[38;5;12m [39m[38;5;12mobjects,[39m[38;5;12m [39m[38;5;12mcompliance[39m[38;5;12m [39m[38;5;12mchecks,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mconfiguration[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mautomated[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mflexible[39m[38;5;12m [39m[38;5;12mapproach[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msecurely[39m[38;5;12m [39m[38;5;12mdeploying[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmaintaining[39m[38;5;12m [39m
|
||||
[38;5;12mthe[39m[38;5;12m [39m[38;5;12mlatest[39m[38;5;12m [39m[38;5;12mreleases[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mWindows[39m[38;5;12m [39m[38;5;12m10.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWMI Monitor[0m[38;5;12m (https://github.com/realparisi/WMI_Monitor) - Log newly created WMI consumers and processes to the Windows Application event log.[39m
|
||||
|
||||
[38;2;255;187;0m[4mActive Directory[0m
|
||||
@@ -515,3 +509,5 @@
|
||||
[38;5;14m[1m![0m[38;5;12mCC-BY[39m[38;5;14m[1m (https://mirrors.creativecommons.org/presskit/buttons/88x31/svg/by.svg)[0m[38;5;12m (https://creativecommons.org/licenses/by/4.0/)[39m
|
||||
|
||||
[38;5;12mThis work is licensed under a [39m[38;5;14m[1mCreative Commons Attribution 4.0 International License[0m[38;5;12m (https://creativecommons.org/licenses/by/4.0/).[39m
|
||||
|
||||
[38;5;12mcybersecurityblueteam Github: https://github.com/fabacab/awesome-cybersecurity-blueteam[39m
|
||||
|
||||
Reference in New Issue
Block a user