Skip to content

thmrevenant/devsecops-toolbox

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 

Repository files navigation

DevSecOps Toolbox

A collection of devsecops tools and resources.

Frameworks & Threat Intelligence

ToolWebsiteDescription
Abusehttps://abuse.ch/A platform focused on threat intelligence.
DomainToolshttps://whois.domaintools.com/Provides DNS and IP information on a domain.
Talos Intelligencehttps://talosintelligence.com/A platform focused on threat intelligence provided by Cisco.
Censyshttps://search.censys.io/A search engine for discovering devices and services exposed on the internet, offering insights into vulnerabilities.
Shodanhttps://www.shodan.io/A search engine that scans and indexes devices connected to the internet, used for identifying network vulnerabilities.
Mitre Attackhttps://attack.mitre.org/A comprehensive framework of adversarial tactics and techniques used by cyber attackers.
Mitre AEPhttps://attack.mitre.org/resources/adversary-emulation-plans/Provides adversary emulation plans that simulate cyber threat actors to test and improve security defenses.
Mitre CARhttps://car.mitre.org/Cyber Analytics Repository that offers security analytics to help detect adversary behaviors on networks.
Mitre D3fendhttps://d3fend.mitre.org/A knowledge base of cybersecurity countermeasures designed to help organizations protect against attacks.
Mitre Engagehttps://engage.mitre.org/A framework designed to guide organizations in planning and executing cyber deception and engagement operations.
LOKIhttps://github.com/Neo23x0/LokiA simple scanner that checks for indicators of compromise (IoCs) using YARA rules and other heuristics.
THOR (Lite)https://www.nextron-systems.com/thor-lite/A professional-grade forensic scanner that detects advanced threats and malicious activity.
Yarahttps://virustotal.github.io/yara/A tool aimed at helping malware researchers identify and classify malware by writing flexible detection rules.
FENRIRhttps://github.com/Neo23x0/FenrirA simple IOC scanner for Unix-based systems designed to be easily integrated into security incident response processes.
yarGenhttps://github.com/Neo23x0/yarGenA tool for generating YARA rules by extracting relevant strings from malware samples.
valhallahttps://valhalla.nextron-systems.com/A service offering a massive collection of curated YARA rules for detecting malware and threats.
YARAifyhttps://yaraify.abuse.ch/Provides a feed of YARA rules and allows scanning of files against YARA rules.
OpenCTIhttps://www.opencti.io/An open-source platform designed to manage, store, and share cyber threat intelligence information.
MISPhttps://www.misp-project.org/An open-source threat intelligence platform for sharing, storing, and correlating indicators of compromise.
IPinfo.iohttps://ipinfo.io/Provides geolocation, ownership details, and privacy detection for IP addresses.
URLScan.iohttps://urlscan.io/A web sandbox that scans and analyzes URLs for threats, generating detailed reports.
DomainTools Whoishttps://whois.domaintools.com/Retrieves domain registration details, including ownership, creation date, and DNS information.
VirusTotalhttps://www.virustotal.com/gui/Analyzes suspicious files and URLs to detect malware and shares findings with the security community.

Network Security

ToolWebsiteDescription
Zenmaphttps://nmap.org/zenmap/The official graphical user interface (GUI) for Nmap.
Snorthttps://www.snort.org/An open-source intrusion detection and prevention system (IDS/IPS).
NetworkMinerhttps://www.netresec.com/?page=NetworkMinerA network forensic analysis tool (NFAT) for extracting and analyzing data from network traffic.
Wiresharkhttps://www.wireshark.org/A network protocol analyzer used for network troubleshooting, analysis, and protocol development.
TSharkhttps://tshark.dev/The command-line version of Wireshark, offering similar functionalities for capturing and analyzing network traffic via CLI.
Brimhttps://www.brimdata.ioThe graphical user interface (GUI) for Zeek.

Endpoint Security & SIEM

ToolWebsiteDescription
TCPViewhttps://learn.microsoft.com/en-us/sysinternals/downloads/tcpviewDisplays active TCP and UDP connections, including process ownership and connection states.
Process Explorerhttps://learn.microsoft.com/en-us/sysinternals/downloads/process-explorerProvides detailed information about running processes.
Wevtutil.exehttps://learn.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutilCommand-line tool for managing Windows Event Logs, including querying, exporting, and clearing logs.
Sysmonhttps://learn.microsoft.com/en-us/sysinternals/downloads/sysmonMonitors and logs detailed system activity to Windows Event Logs for security analysis.
Osqueryhttps://www.osquery.ioUses SQL-like queries to collect and analyze operating system data for monitoring, compliance, and security.
Wazuhhttps://wazuh.com/A free SIEM platform for threat detection, compliance, and IT security monitoring.
Process Hackerhttps://processhacker.sourceforge.io/Open-source tool for monitoring processes, detecting malicious activity, and troubleshooting.
Autorunshttps://learn.microsoft.com/en-us/sysinternals/downloads/autorunsShows programs configured to run at system startup or login in detail.
Procdumphttps://learn.microsoft.com/en-us/sysinternals/downloads/procdumpCaptures process dumps during CPU spikes or application crashes for debugging purposes.
Splunkhttps://www.splunk.com/A platform for collecting, indexing, and analyzing machine-generated data in real-time.

DFIR

ToolWebsiteDescription
FTK Imagerhttps://www.exterro.com/digital-forensics-software/ftk-imagerA forensic imaging tool used to preview, image, and analyze digital evidence.
RegRipperhttps://github.com/keydet89/RegRipper3.0Extracts and analyzes Windows registry data using plugins for incident response and forensics.
Zimmerman's Registry Explorerhttps://ericzimmerman.github.io/Parses and analyzes Windows registry hives for forensic artifacts.
ShellBagExplorerhttps://ericzimmerman.github.io/Analyzes ShellBag registry data to track folder access and browsing history.
Registry Viewerhttps://ericzimmerman.github.io/Examines Windows registry files for forensic analysis of keys, values, and settings.
Autopsyhttps://www.autopsy.comOpen-source digital forensics platform for investigating and analyzing hard drives and files.
Redlinehttps://fireeye.market/apps/211364Provides host investigative capabilities to detect malicious activity through memory and file analysis.
KAPEhttps://www.kroll.com/en/services/cyber-risk/incident-response-litigation-support/kroll-artifact-parser-extractor-kapeCollects and processes forensic artifacts efficiently during investigations.
Volatilityhttps://github.com/volatilityfoundation/volatilityAn open-source memory forensics framework for analyzing RAM dumps.
Velociraptorhttps://docs.velociraptor.app/Endpoint monitoring and digital forensics tool.
The Hivehttps://github.com/TheHive-Project/TheHiveAn open-source incident response platform for managing security events collaboratively.
PE Treehttps://github.com/blackberry/pe_treeVisualizes Portable Executable (PE) files to aid malware analysis.
Olevbahttps://github.com/decalage2/oletools/wiki/olevbaAnalyzes Microsoft Office documents to detect and extract malicious VBA macros and indicators of compromise.

Sandboxes

ToolWebsiteDescription
Cuckoo Sandboxhttps://cuckoosandbox.org/Open-source automated malware analysis system for dynamic analysis of suspicious files and URLs.
CAPE Sandboxhttps://capev2.readthedocs.io/en/latest/index.htmlMalware analysis sandbox focused on unpacking and analyzing malicious payloads and executables.
Any.runhttps://any.run/Interactive online malware sandbox allowing real-time analysis of suspicious files and activities.
Hybrid Analysishttps://www.hybrid-analysis.com/Free malware analysis service powered by Falcon Sandbox for static and dynamic threat analysis.

Phishing & Mails

ToolWebsiteDescription
Phish Toolhttps://phishtool.com/A platform designed for detecting, analyzing, and managing phishing threats.
Message Header Analyzerhttps://mha.azurewebsites.net/Parses and analyzes email headers to trace the path of messages and identify potential issues.
Mail Header Analyzerhttps://mailheader.org/Makes email headers legible by parsing records for detailed analysis of message routing.
MXToolboxhttps://mxtoolbox.com/Provides tools to analyze DNS, MX records, and email server configurations for troubleshooting.
PhishTankhttps://phishtank.com/Community-driven platform to track, verify, and share information about phishing websites.
Spamhaushttps://www.spamhaus.org/Offers IP and domain reputation services to detect and block spam, malware, and other threats.
Google Messageheaderhttps://toolbox.googleapps.com/apps/messageheader/Analyzes email headers to identify delivery delays, their sources, and responsible parties.
Phishing IR Playbookhttps://github.com/counteractive/incident-response-plan-template/blob/master/playbooks/playbook-phishing.mdA comprehensive playbook for investigating, remediating, and communicating during phishing incidents.

Miscellaneous

ToolWebsiteDescription
URL2PNGhttps://www.url2png.com/Captures snapshots of websites through an intuitive API for integration into apps or workflows.
Wannabrowserhttps://www.wannabrowser.net/Allows viewing HTML source code of websites using different user-agent perspectives to detect cloaking.
CVE Crowdhttps://cvecrowd.com/A platform for discussing and sharing information about CVEs and vulnerabilities.
Fedisec Feedshttps://fedisecfeeds.github.io/Aggregates security-related data, including CVE updates, in JSON format for easy access.

Red Teaming

ToolWebsiteDescription
GTFOBinshttps://gtfobins.github.io/GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published