Skip to content

A conglomeration of resources for any color of the rainbow

License

Notifications You must be signed in to change notification settings

danielgottt/CyberBodega

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

492 Commits
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

CyberBodega

A conglomeration of resources for any color of the rainbow

     _________       ______                  ________      _________                    
     __  ____/____  ____  /______________    ___  __ )___________  /___________ ______ _
     _  /    __  / / /_  __ \  _ \_  ___/    __  __  |  __ \  __  /_  _ \_  __ `/  __ `/
     / /___  _  /_/ /_  /_/ /  __/  /        _  /_/ // /_/ / /_/ / /  __/  /_/ // /_/ / 
     \____/  _\__, / /_.___/\___//_/         /_____/ \____/\__,_/  \___/_\__, / \__,_/  
             /____/                                                     /____/                                                                 

                                          Continuously Updated Since 16 July 2020

๐Ÿท๏ธ Resource Tags

  • Open Source - Open-source projects and tools
  • Free - Free resources (may require registration)
  • Freemium - Free tier available with paid options
  • Paid - Paid/commercial resources

Contents


Quick Links

  • RSS Feed Conglomeration of InfoSec RSS feeds

๐Ÿ“ฐ InfoSec News

Stay updated with the latest security news and research


๐Ÿ“š Interesting Articles & Videos

Deep dives, research papers, and educational content


๐Ÿ”ฌ Research Resources

๐Ÿ“ Write-ups

  • Unit 42 Palo Alto Networks threat intelligence and research
  • Google Intel/Mandiant Latest news and insights from Google security team -- Really just Mandiant
  • Trellix Blog Cybersecurity threat research and news from Trellix
  • The DFIR Report Real-world intrusion analysis and incident response reports
  • Sophos X-Ops Threat intelligence and research from Sophos security teams
  • Intel471 Cyber threat intelligence focused on cybercrime
  • WatchTowr Labs Goated writeups

๐Ÿ” Research Sites

  • Exploit DB Archive of exploits and vulnerable software
  • Shodan Search engine for Internet-connected devices
  • National Vulnerability Database US government repository of standards-based vulnerability data
  • CVE Proof of Concepts Collection of CVE proof-of-concept exploits
  • OWASP Open Web Application Security Project - web security resources and tools
  • OSINT Framework Collection of OSINT tools and resources organized by category
  • OpenThreatResearch Open-source threat research and detection engineering
  • BellingCat Independent investigative journalism using open source intelligence
  • Zoomeye Cyberspace search engine for devices and services
  • Spyse Internet assets search engine for cybersecurity professionals
  • Web Check Insight into the inner-workings of a given website
  • Juniverse Security knowledge base and research platform
  • Attack Rule Map Interactive visualization of MITRE ATT&CK techniques mapped to detection rules
  • POC||GTFO Archive Archive of Proof of Concept or Get The Fuck Out hacking journal
  • Monocle Cam Portal Security camera analysis and OSINT tool
  • MalOps Malware operations analysis and tracking
  • The Evidence Locker Digital forensics evidence repository and resources
  • Triage.zip Incident triage and analysis resources

๐ŸŽฏ Cyber Threat Intelligence


๐ŸŽ“ Training Resources

Free courses, labs, and hands-on learning platforms


๐Ÿ›ก๏ธ Blue Team Resources

Defensive security tools and resources

Quick Navigation: Utility | Network Analysis | Host Analysis | Detection | Malware Analysis | Forensics

  • EricZimmerman Collection of forensics and incident response tools

๐Ÿ”ง Utility

  • Cyber Chef Web app for analysing and decoding data
  • Cyber Chef Recipes A list of cyber-chef recipes and curated links
  • LOLBAS Windows LOLBins and how they are abused
  • GTFOBins Unix LOLBins and how they are abused
  • MITRE ATT&CK Globally-accessible knowledge base of adversary tactics and techniques
  • MITRE D3FEND Knowledge graph of countermeasures to ATT&CK TTP's
  • Wazuh Open source unified XDR and SIEM protection for endpoints and cloud workloads
  • MozDef Enterprise defense platform
  • Stronghold A way to securely configure your Mac
  • ChopShop Framework to aid analysts in the creation and execution of pynids based decoders and detectors of APT tradecraft
  • RockNSM An open source Network Security Monitoring platform
  • HELK Open source hunt platforms with advanced analytics
  • AlienVault OSSIM Feature-rich open source SIEM w/ collection, normalization and correlation
  • Prelude Universal SIEM
  • TheHive Open source and free Security Incident Response Platform
  • OpenEDR Free and open source EDR
  • OpenSOC Open source big data technologies in order to offer a centralized tool for security monitoring and analysis
  • Munin Online Hash Checker for Virustotal and Other Services
  • Threat Hunt Mind Maps Mindmaps for cloud security, threat hunting and incident response
  • Hybrid-Analysis Free malware analysis service
  • Manalyzer Free service which performs static analysis on PE executables to detect undesirable behavior
  • URLScan Free URL/website scanner
  • Intezer Analyze Free IOC/malware scanner
  • AnyRun Interactive malware analysis
  • JoeSandbox Malware anaylsis
  • IRIS-H Online automated static analysis of files stored in a directory-based or strictly structured formats
  • Yoroi Free file analyzer
  • Har-Sai Lookup things related to a specific CVE
  • Rastrea2r Multi-platform open source tool that allows incident responders and SOC analysts to triage suspect systems and hunt for Indicators of Compromise (IOCs) across thousands of endpoints in minutes
  • HijackLibs Aims to keep a record of publicly disclosed DLL Hijacking opportunities
  • Diaphore Program diffing tool working as an IDA plugin
  • MalAPI List of Windows APIs to common techniques used by malware
  • Sentinel Queries List of Azure Sentinel queries
  • EchoTrail Windows Process Insights
  • PulledPork PulledPork for Snort and Suricata rule management
  • Microsoft Threat Modeling Microsoft tool related to threat modeling
  • DocIntel DocIntel is an open-source context-centric threat intelligence platform
  • Multi Router Traffic Grapher (MRTG) Monitor SNMP network devices and draw pretty pictures showing how much traffic has passed through each interface
  • GHOSTS Realistic user simulation framework for cyber simulation, training, and exercise
  • Discร˜very Security analysis tool for IoT and 5G systems
  • LogonTracer Investigate malicious Windows logon by visualizing and analyzing Windows event log
  • Exmaple Pentest Reports Sample penetration testing reports
  • EC2 IR General walkthrough of IR capes in AWS
  • Linux Audit Data Sources Comprehensive list of Linux audit data sources
  • Splunk Security Content Open-source security content for Splunk
  • Splunk Attack Range Tool to build lab environments for testing detection and response
  • Splunk Research Splunk security research and threat hunting content
  • Splunk CI/CD Detection Engineering Guide to implementing CI/CD for detection engineering
  • Package Inferno PowerShell package analysis and security tool

๐ŸŒ Network Analysis

  • Open Source Arkime Open source full packet capturing, indexing and database system. It rebuilds sessions automatically!
  • Open Source Wireshark Tride and true network protocol analyzer
  • Open Source Zeek An Open Source Network Security Monitoring Tool
  • Open Source Google Stenographer Stenographer is a full-packet-capture utility for buffering packets to disk. Allows you to rip out
  • Open Source PcapXray A tool to visualize Packet Capture offline as a Network Diagram
  • Open Source RITA Open-source framework for detecting command and control communication through network traffic analysis
  • Open Source Whats that C2/Exfil? Github repo full of known c2 and exfil traffic keywords
  • Open Source Incubating Open source software for leveraging insights from flow and packet analysis
  • Free Network Miner Open source Network Forensic Analysis Tool
  • Open Source VAST Network telemetry engine for data-driven security investigations
  • Open Source NetSniff Free Linux networking toolkit
  • Open Source SpoofSpotter A tool to catch spoofed NBNS responses
  • Open Source Grass Marlin๐Ÿฆ… Network situational awareness of ICS and SCADA networks
  • Open Source SELKS Open source Debian-based IDS/IPS/Network Security Monitoring platform
  • Open Source SiLK Collection of traffic analysis tools

๐Ÿ’ป Host Analysis

  • Open Source Velociraptor Tool for collecting host based state information using The Velociraptor Query Language (VQL) queries
  • Open Source Hayabusa Windows event log fast forensics timeline generator and threat hunting tool (Sigma compatible)
  • Open Source Osquery Tool that provides performant endpoint visibility
  • Free Sysinternalsuite Suite of tools providing a multitude of capabiltiies for defenders or attackers
  • Open Source Sticky Keys Slayer Scans for accessibility tools backdoors via RDP
  • Open Source CimSweep Suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely
  • Open Source Seatbelt Security oriented host-survey tool performing "safety checks" relevant from both offensive and defensive security perspectives
  • Open Source Live-Forensicator Assist's responders in carrying out live forensic investigations
  • Open Source DeepBlueCLI PowerShell Module for Threat Hunting via Windows Event Logs
  • Open Source Chainsaw Powerful 'first-response' capability to quickly identify threats within Windows event logs
  • Open Source Google Rapid Response Python agent that is installed on target systems, and python server infrastructure that can manage and talk to clients
  • Open Source PSHunt Powershell Threat Hunting Module designed to scan remote endpoints
  • Open Source PSRecon Gathers data from a remote Windows host using PowerShell
  • Free Redline Free EDR, thats pretty cool
  • Open Source Power Forensics Inclusive framework for hard drive forensic analysis
  • Open Source Block Parse PowerShell script block parser
  • Open Source Sysmon4Linux The sysmon you love for a flavor of nix
  • Open Source Dissect Digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats

๐Ÿ” Detection

  • Open Source Sigma Sigma is a generic and open signature format that allows you to describe relevant log events in a straightforward manner
  • Open Source Yara Tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples
  • Open Source Snort Open source intrusion prevention and detection system
  • Open Source Suricata High performance Network IDS, IPS and Network Security Monitoring engine
  • Free BlockBlock Monitors common persistence locations and alerts whenever a persistent component is added
  • Open Source Santa Binary authorization system for macOS
  • Open Source MalTrail Malicious traffic detection system
  • Open Source DetectIQ Open-source threat detection validation framework that enables continuous validation of detection rules
  • Open Source Galah LLM-powered web honeypot designed to mimic various web applications and dynamically respond to arbitrary HTTP requests
  • Free Detections.ai Community-driven detection rules and threat hunting queries

๐Ÿฆ  Malware Analysis

  • Open Source Remnux Linux toolkit for reverse-engineering and analyzing malicious software
  • Open Source Tools by hasherezade Linux toolkit for reverse-engineering and analyzing malicious software
  • Freemium IDA Binary code analysis tool
  • Open Source FLARE Floss Automatically deobfuscate strings from malware binaries
  • Paid BinaryNinja Interactive disassembler, decompiler, and binary analysis platform
  • Open Source BinaryPig Malware Processing and Analytics
  • Open Source Ghidra๐Ÿฆ… Software reverse engineering suite of tools
  • Free HxD Carefully designed and fast hex editor
  • Open Source Redare2 Set of libraries, tools and plugins to ease reverse engineering tasks
  • Open Source TheMatrix Project created to ease the malware analysis process
  • Free OllyDbg 32-bit assembler level analysing debugger
  • Open Source oletools Package of python tools to analyze files
  • Open Source The Sleuth Kit/Autopsy Open Source Digital Forensics
  • Open Source Cuckoo Sandbox Leading open source automated malware analysis system
  • Freemium Malcat Feature-rich hexadecimal editor / disassembler for Windows and Linux
  • Open Source malwoverview First response tool used for threat hunting and offers intel information from OSINT sites
  • Open Source unblob Extract files from any kind of container formats, filesystems, and firmware

๐Ÿ”ฌ Forensics

  • Open Source CyLR Cold disk file collector
  • Open Source Dissect Digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts from various disk and file formats
  • Open Source Volatility Python tool used for the extraction of digital artifacts from volatile memory (RAM) samples

๐Ÿ” Audit & Vulnerability

  • nuclei Fast and customisable vulnerability scanner based on simple YAML based DSL
  • Clair Open source project for the static analysis of vulnerabilities in application containers
  • Chef InSpec Audit and automated testing framework
  • Lynis Security auditing tool for *nix and macOS
  • VulnWhisperer Vulnerability management tool and report aggregator
  • OpenVAS Full-featured vulnerability scanner

๐Ÿ“Š Malware IOC Detection Data Dumps

  • vx-underground samples The largest collection of malware source code, samples, and papers on the internet
  • jstrosch Samples Repository intended to provide access to a wide variety of malicious files and other artifacts
  • DigitalSide Threat-Intel Repo Repository that contains a set of Open Source Cyber Threat Intellegence information
  • MalwareBazar Project from abuse.ch with the goal of sharing malware samples
  • DailyIOC Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups
  • Valhalla Yara Rules Professional YARA rules database for malware detection
  • Yara Rules Project Community-driven collection of YARA rules for malware detection
  • Virustotal Yara VirusTotal's YARA rule repository
  • Florian Roth Signature base for YARA, Sigma and IOC scanners

๐Ÿงฐ Blue Bin

Miscellaneous blue team tools and scripts

  • Zeek to Cuckoo Automating file extraction submission and analysis to Cuckoo Sandbox from Zeek
  • Ox4Shell De-obfuscate Log4Shell payloads

โš”๏ธ Purple/Red Team Resources

Offensive security tools and adversary simulation

Quick Navigation: Command & Control | Reconnaissance | Password Tools

  • Open Source Metasploit Framework An exploit framework
  • Open Source APTSimulator A Windows Batch script that creates files to make a system look as if it was compromised
  • Open Source Atomic Red Team Library of tests mapped to the MITRE ATT&CKยฎ framework
  • Open Source Metta Adversary simulation tool
  • Open Source Network Flight Simulator Lightweight utility used to generate malicious network traffic
  • Open Source Cladera Framework Platform designed to easily automate adversary emulation, assist manual red-teams, and automate incident response
  • Open Source PowerSploit Collection of Microsoft PowerShell module's to aid in multiple phases of an assessment
  • Open Source Impacket Impacket is a collection of Python classes for working with network protocols
  • Open Source sqlmap Open source tool that automates the process of detecting and exploiting SQL injection flaws
  • Open Source Silver Open source cross-platform adversary emulation/red team framework
  • Open Source Gobuster Gobuster is a tool used to brute-force subdomains, website URI's, open S3 buckets and more
  • Open Source Exegol Exegol is a community-driven hacking environment, powerful and yet simple enough to be used by anyone in day to day engagements
  • Open Source EmpireProject Empire is a post-exploitation framework, which is sadly not maintained anymore
  • Open Source Reubeus Rubeus is a C# toolset for raw Kerberos interaction and abuses
  • Open Source Responder Responder is an LLMNR, NBT-NS and MDNS poisoner
  • Open Source Inveigh Inveigh is a cross-platform .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
  • Open Source ExploitDB Archive of public exploits and corresponding vulnerable software
  • Open Source DumpsterFire Tool used for building repeatable, time-delayed, and distributed security events
  • Open Source Stratus Red Team Essentially Atmoic red team, but focused on cloud
  • Open Source RTA Framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft
  • Open Source Infection Monkey Open source security tool for testing resiliency on perimeter breaches and internal server infection
  • Open Source Invoke-Powershell PowerShell script that helps you to evaluate security products and monitoring solutions
  • Open Source DSInternals Active directory PowerShell Module and Framework

๐ŸŽฎ Command & Control

  • Free C2 Matrix Find the best C2 framework for your needs based on your target environment
  • Paid Cobalt Strike Post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network
  • Paid Brute Ratel C4 Customized Command and Control Center for Red Team and Adversary Simulation
  • Open Source PoshC2 Proxy aware C2 framework

๐Ÿ”ญ Reconnaissance

  • Photon Crawler Incredibly fast crawler designed for OSINT
  • Subcrawl Developed to find, scan and analyze open directories
  • subfinder Fast passive subdomain enumeration tool
  • MASSCAN An Internet-scale port scanner
  • Nmap Open source utility for network discovery and security auditing
  • Angry IP Scanner Fast and friendly network scanner
  • Google Dorking Technique that uses Google Search and other Google applications to find security holes
  • Github Dorking Technique that uses Github to find interesting things
  • Shoder PoC leveraging shodan's pythons library
  • naabu Port scanning tool written in Go that allows you to enumerate valid ports for hosts in a fast and reliable manner
  • uncover Quickly discover exposed hosts on the internet using multiple search engines
  • wtfis Passive hostname, domain and IP lookup tool for non-robots
  • OsintUI OSINT from your favorite services in a friendly terminal user interface
  • ExchangeFinder Find Microsoft Exchange instance for a given domain and identify the exact version

๐Ÿ”‘ Password Tools

  • Cain & Abel Password recovery tool for Microsoft Operating Systems
  • Hashcat Advanced password recovery tool for most operating systems
  • John Open Source password security auditing and password recovery tool
  • Mimikatz Extract plaintexts passwords, hashs, PIN codes and kerberos tickets from memory
  • LaZange Credentials recovery project

๐Ÿงฐ Red Bin

Miscellaneous red team tools and payloads


โ˜๏ธ Cloud Security

Cloud-specific security tools and resources

๐Ÿ› ๏ธ Tools

  • Basic Blob Finder POC tool to hunt for public Azure storage containers and enumerate the blobs
  • TeamFiltration Framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts
  • cloudlist Multi-cloud tool for getting Assets from Cloud Providers

๐Ÿค– AI/ML Security

AI-powered security tools and machine learning resources

  • ChatGPT AI language model for various tasks including code generation and analysis
  • SlidesAI Create Presentation Slides with AI in seconds
  • Replit Build software collaboratively with the power of AI

โญ Awesome Lists

Curated collections of security resources


๐Ÿ“ฆ Resource Dump

Miscellaneous tools and resources

  • Pexpect Python module for spawning child applications; controlling them; and responding to expected patterns in their output
  • Unofficial OSCP Tool Distro List of approved tools for OSCP exam preparation
  • Florian Roth's BlueLedger A list of some interesting community support projects
  • CIS CAT CIS Configuration Assessment Tool guide
  • ProjectDiscovery Security Through Intelligent Automation
  • HashR HashR allows you to build your own hash sets based on your data sources
  • ATT&CK Pyton Client Python module to access up-to-date ATT&CK content
  • SilkETW Collects, filters and processes Windows Event Tracing (ETW) data
  • Ransomwatch Latest news on ransomware related posts

About

A conglomeration of resources for any color of the rainbow

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •