Giter Club home page Giter Club logo

infosechouse's Introduction




Tools & Resources for Cyber Security Operations


A curated list of many tools and resources for both offensive and defensive security teams.

Please visit https://infosec.house for our website version of this repo. Found a resources that should be on here? Feel free to submit a pull request!

Defensive Security

asset-count

Sub-Category Description
Asset Management Keep track of your inventory. You can't protect what you don't see.
Auditing Stay in compliance.
Courses Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase.
Endpoint Protection Protect your endpoints.
Forensics Uncover the dirty little secrets of a recovered HDD, Image, malware, and more.
Honeypots Catch them with their hands/attacks sticky.
IDS/IPS Intrusion Detection and Prevention Systems.
Incident Response Incident response tools, and resources when alarms pop off.
IOC Indicators of compromise. Discover if you've been compromised.
Malware All the malware you can wish for to reverse engineer.
Monitoring Monitor your network, e-mail, packets, and infrastructure.
Operating Systems Operating system's solely focused for defensive security teams.
Phishing Tools and resources for analyzing phishing attacks.
Threat Intel Discover where the threats begin.

Offensive Security

asset-count

Sub-Category Description
API Tools and resources for pentesting against API endpoints.
Blogs Reading material for offensive security researchers.
Bug Bounty Test out your skills against other hackers. Get paid for finding vulnerabilities.
Command & Control Command and Control tools and frameworks.
Cheat Sheets Offensive security cheat sheets.
Cloud Discover tools and resources dedicated to hacking cloud platforms.
Collaboration Discover tools and frameworks for red team collaboration.
Courses Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase.
Cracking Everything you need to crack all the hashes.
Cryptography How great is your cryptography.
CTF Offensive Compete your hacking skills against others.
Data Exfiltration Exfiltrate the data, and test your DLP.
E-Mail E-Mail pentesting tools and resources.
Evasion Evade getting caught.
Exploits Gather all your exploits needed to pop that box.
Firewalls Attack the castle doors.
Hardware Grab some of the most used hardware within the penetration testing industry.
Linux Tools and resources for popping those linux boxes.
Mobile Tools and resources for pentesting on mobile applications.
Network Sniff the network. Modify the packets.
Operating Systems Operating system's solely focused for offensive security teams.
Reconnaissance Understand your target. Perform in-depth research and discover new attack surfaces.
Shells Generating pre-built webshells to customizing your own.
Social Engineering Manipulation techniques that exploits human error to gain private information, access, or valuables.
Vulnerability Scanners Discover vulnerabilities fast, and automate some of the heavy loads.
Web Application Break that web application.
Windows Mirosoft Windows pentesting tools and resources.
Wireless Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more.

Operation Security

asset-count

Sub-Category Description
Anonymity The quality or state of being anonymous. Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance.
Anti-Forensics Destroy your data.
Burners Everything for your temporary needs.
Communication Protect your SMS messages, voice calls, and e-mails. Big brother is always watching.
Operating Systems Hardening your operating system.
Passwords & Authentication Secure your passwords, secrets, and notes.
Search Engines Hardening your operating system.

Purple Security

asset-count

Sub-Category Description
Analysis Tools and scripts for analyzing data.
Courses Training and courses to master your craft.
Editors & Viewers Tools for editing/viewing files.
Emulation Emulate the adversary.
Network Network tools both offensive and defensive operations can utilize.
OSINT Open-Source Intel. Get all the information needed for your target.
Passwords 1,000+ default passwords.
Reverse Engineering Reverse engineering tools both offensive and defensive operations can utilize.
Write-Ups Write-ups both offensive and defensive operataions can utilize.

Entertainment

asset-count

Sub-Category Description
Music Kick back relax and enjoy some entertainment.
Video Talks, livestreams, and presentations.

Livestream Contributors

Shoutout to the following amazing individuals for suggesting and adding resources during our livestream.

Anonymous, 0xgnnr, 0xrom, Binary.rip, CyberLola, DevNullZen, EightBitOni, GoProSlowYo, JR0ch17, projectdp, PaWNmUnCher, RySkill, Vander_Grift, chadb_n00b, footpics4sale, goldyautomation, halfamomo, p4r4n0ir, skyfire100, theGwar, and zuphzuph.

infosechouse's People

Contributors

infosec-house avatar projectdp avatar jr0ch17 avatar metaman13 avatar c3n7ral051nt4g3ncy avatar ryleysill93 avatar

Watchers

James Cloos avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.