InfosecHouse
InfosecHouse copied to clipboard
Tools & Resources for Cyber Security Operations
Tools & Resources for Cyber Security Operations
A curated list of many tools and resources for both offensive and defensive security teams.
Please visit https://infosec.house for our website version of this repo. Found a resources that should be on here? Feel free to submit a pull request!
Defensive Security
Sub-Category | Description |
---|---|
Asset Management | Keep track of your inventory. You can't protect what you don't see. |
Auditing | Stay in compliance. |
Courses | Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase. |
Endpoint Protection | Protect your endpoints. |
Forensics | Uncover the dirty little secrets of a recovered HDD, Image, malware, and more. |
Honeypots | Catch them with their hands/attacks sticky. |
IDS/IPS | Intrusion Detection and Prevention Systems. |
Incident Response | Incident response tools, and resources when alarms pop off. |
IOC | Indicators of compromise. Discover if you've been compromised. |
Malware | All the malware you can wish for to reverse engineer. |
Monitoring | Monitor your network, e-mail, packets, and infrastructure. |
Operating Systems | Operating system's solely focused for defensive security teams. |
Phishing | Tools and resources for analyzing phishing attacks. |
Threat Intel | Discover where the threats begin. |
Offensive Security
Sub-Category | Description |
---|---|
API | Tools and resources for pentesting against API endpoints. |
Blogs | Reading material for offensive security researchers. |
Bug Bounty | Test out your skills against other hackers. Get paid for finding vulnerabilities. |
Command & Control | Command and Control tools and frameworks. |
Cheat Sheets | Offensive security cheat sheets. |
Cloud | Discover tools and resources dedicated to hacking cloud platforms. |
Collaboration | Discover tools and frameworks for red team collaboration. |
Courses | Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase. |
Cracking | Everything you need to crack all the hashes. |
CTF Offensive | Compete your hacking skills against others. |
Data Exfiltration | Exfiltrate the data, and test your DLP. |
Evasion | Evade getting caught. |
Exploits | Gather all your exploits needed to pop that box. |
Firewalls | Attack the castle doors. |
Hardware | Grab some of the most used hardware within the penetration testing industry. |
Linux | Tools and resources for popping those linux boxes. |
Mobile | Tools and resources for pentesting on mobile applications. |
Network | Sniff the network. Modify the packets. |
Operating Systems | Operating system's solely focused for offensive security teams. |
Reconnaissance | Understand your target. Perform in-depth research and discover new attack surfaces. |
Shells | Generating pre-built webshells to customizing your own. |
Social Engineering | Manipulation techniques that exploits human error to gain private information, access, or valuables. |
Vulnerability Scanners | Discover vulnerabilities fast, and automate some of the heavy loads. |
Web Application | Break that web application. |
Windows | Mirosoft Windows pentesting tools and resources. |
Wireless | Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more. |
Operation Security
Sub-Category | Description |
---|---|
Anonymity | The quality or state of being anonymous. Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance. |
Anti-Forensics | Destroy your data. |
Burners | Everything for your temporary needs. |
Communication | Protect your SMS messages, voice calls, and e-mails. Big brother is always watching. |
Operating Systems | Hardening your operating system. |
Passwords & Authentication | Secure your passwords, secrets, and notes. |
Search Engines | Hardening your operating system. |
Purple Security
Sub-Category | Description |
---|---|
Courses | Training and courses to master your craft. |
Editors & Viewers | Tools for editing/viewing files. |
Emulation | Emulate the adversary. |
Network | Network tools both offensive and defensive operations can utilize. |
OSINT | Open-Source Intel. Get all the information needed for your target. |
Passwords | 1,000+ default passwords. |
Reverse Engineering | Reverse engineering tools both offensive and defensive operations can utilize. |
Write-Ups | Write-ups both offensive and defensive operataions can utilize. |
Entertainment
Sub-Category | Description |
---|---|
Music | Kick back relax and enjoy some entertainment. |
Video | Talks, livestreams, and presentations. |
Livestream Contributors
Shoutout to the following amazing individuals for suggesting and adding resources during our livestream.
Anonymous, 0xgnnr, 0xrom, Binary.rip, CyberLola, DevNullZen, EightBitOni, GoProSlowYo, JR0ch17, projectdp, PaWNmUnCher, RySkill, Vander_Grift, chadb_n00b, footpics4sale, goldyautomation, halfamomo, p4r4n0ir, skyfire100, theGwar, and zuphzuph.