From 768b2a82598091b611d8f21365a6649a7c6a7b9a Mon Sep 17 00:00:00 2001
From: Maciej Michalski <5445923+spy86@users.noreply.github.com>
Date: Thu, 22 Feb 2024 20:20:02 +0100
Subject: [PATCH 1/5] Delete _config.yml
---
_config.yml | 1 -
1 file changed, 1 deletion(-)
delete mode 100644 _config.yml
diff --git a/_config.yml b/_config.yml
deleted file mode 100644
index fc24e7a..0000000
--- a/_config.yml
+++ /dev/null
@@ -1 +0,0 @@
-theme: jekyll-theme-hacker
\ No newline at end of file
From cd27007c953c7b40e3963cffe27acf61cb0056bf Mon Sep 17 00:00:00 2001
From: Maciej Michalski <5445923+spy86@users.noreply.github.com>
Date: Thu, 22 Feb 2024 20:20:19 +0100
Subject: [PATCH 2/5] Update LICENSE
---
LICENSE | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/LICENSE b/LICENSE
index 82ccc3c..4adb759 100644
--- a/LICENSE
+++ b/LICENSE
@@ -1,6 +1,6 @@
MIT License
-Copyright (c) 2021 Maciej Michalski
+Copyright (c) 2024 Maciej Michalski
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
From 24f02990d54d4b476c27cd2a2984be3af2736401 Mon Sep 17 00:00:00 2001
From: Maciej Michalski <5445923+spy86@users.noreply.github.com>
Date: Thu, 22 Feb 2024 20:20:36 +0100
Subject: [PATCH 3/5] Delete docs directory
---
docs/index.rst | 873 -------------------------------------------------
1 file changed, 873 deletions(-)
delete mode 100644 docs/index.rst
diff --git a/docs/index.rst b/docs/index.rst
deleted file mode 100644
index b7008ce..0000000
--- a/docs/index.rst
+++ /dev/null
@@ -1,873 +0,0 @@
-Awesome Security
-================
-
-A collection of awesome software, libraries, documents, books, resources
-and cool stuff about security.
-
-- `Awesome Security <#awesome-security>`__
-- `Network <#network>`__
-
- - `Scanning / Pentesting <#scanning--pentesting>`__
- - `Monitoring / Logging <#monitoring--logging>`__
- - `IDS / IPS / Host IDS / Host
- IPS <#ids--ips--host-ids--host-ips>`__
- - `Honey Pot / Honey Net <#honey-pot--honey-net>`__
- - `Full Packet Capture /
- Forensic <#full-packet-capture--forensic>`__
- - `Sniffer <#sniffer>`__
- - `Security Information & Event
- Management <#security-information--event-management>`__
- - `VPN <#vpn>`__
- - `Fast Packet Processing <#fast-packet-processing>`__
- - `Firewall <#firewall>`__
- - `Anti-Spam <#anti-spam>`__
- - `Docker <#docker-images-for-penetration-testing--security>`__
-
-- `Endpoint <#endpoint>`__
-
- - `Anti-Virus / Anti-Malware <#anti-virus--anti-malware>`__
- - `Content Disarm & Reconstruct <#content-disarm--reconstruct>`__
- - `Configuration Management <#configuration-management>`__
- - `Authentication <#authentication>`__
- - `Mobile / Android / iOS <#mobile--android--ios>`__
- - `Forensics <#forensics>`__
-
-- `Threat Intelligence <#threat-intelligence>`__
-- `Web <#web>`__
-
- - `Organization <#organization>`__
- - `Web Application Firewall <#web-application-firewall>`__
- - `Scanning / Pentesting <#scanning--pentesting-1>`__
- - `Runtime Application
- Self-Protection <#runtime-application-self-protection>`__
- - `Development <#development>`__
-
-- `Usability <#Usability>`__
-- `Big Data <#big-data>`__
-- `Datastores <#datastores>`__
-- `DevOps <#devops>`__
-- `Operating Systems <#operating-systems>`__
-
- - `Online resources <#online-resources>`__
-
-- `Other Awesome Lists <#other-awesome-lists>`__
-
- - `Other Security Awesome Lists <#other-security-awesome-lists>`__
- - `Other Common Awesome Lists <#other-common-awesome-lists>`__
-
-- `Contributing <#contributing>`__
-
---------------
-
-Network
--------
-
-Scanning / Pentesting
-~~~~~~~~~~~~~~~~~~~~~
-
-- `OpenVAS `__ - OpenVAS is a framework of
- several services and tools offering a comprehensive and powerful
- vulnerability scanning and vulnerability management solution.
-- `Metasploit
- Framework `__ - A
- tool for developing and executing exploit code against a remote
- target machine. Other important sub-projects include the Opcode
- Database, shellcode archive and related research.
-- `Kali `__ - Kali Linux is a Debian-derived
- Linux distribution designed for digital forensics and penetration
- testing. Kali Linux is preinstalled with numerous penetration-testing
- programs, including nmap (a port scanner), Wireshark (a packet
- analyzer), John the Ripper (a password cracker), and Aircrack-ng (a
- software suite for penetration-testing wireless LANs).
-- `pig `__ - A Linux packet
- crafting tool.
-- `scapy `__ - Scapy: the python-based
- interactive packet manipulation program & library.
-- `Pompem `__ - Pompem is an open
- source tool, which is designed to automate the search for exploits in
- major databases. Developed in Python, has a system of advanced
- search, thus facilitating the work of pentesters and ethical hackers.
- In its current version, performs searches in databases: Exploit-db,
- 1337day, Packetstorm Security...
-- `Nmap `__ - Nmap is a free and open source utility
- for network discovery and security auditing.
-
-Monitoring / Logging
-~~~~~~~~~~~~~~~~~~~~
-
-- `justniffer `__ - Justniffer is a
- network protocol analyzer that captures network traffic and produces
- logs in a customized way, can emulate Apache web server log files,
- track response times and extract all "intercepted" files from the
- HTTP traffic.
-- `httpry `__ - httpry is a
- specialized packet sniffer designed for displaying and logging HTTP
- traffic. It is not intended to perform analysis itself, but to
- capture, parse, and log the traffic for later analysis. It can be run
- in real-time displaying the traffic as it is parsed, or as a daemon
- process that logs to an output file. It is written to be as
- lightweight and flexible as possible, so that it can be easily
- adaptable to different applications.
-- `ngrep `__ - ngrep strives to provide
- most of GNU grep's common features, applying them to the network
- layer. ngrep is a pcap-aware tool that will allow you to specify
- extended regular or hexadecimal expressions to match against data
- payloads of packets. It currently recognizes IPv4/6, TCP, UDP,
- ICMPv4/6, IGMP and Raw across Ethernet, PPP, SLIP, FDDI, Token Ring
- and null interfaces, and understands BPF filter logic in the same
- fashion as more common packet sniffing tools, such as tcpdump and
- snoop.
-- `passivedns `__ - A tool to
- collect DNS records passively to aid Incident handling, Network
- Security Monitoring (NSM) and general digital forensics. PassiveDNS
- sniffs traffic from an interface or reads a pcap-file and outputs the
- DNS-server answers to a log file. PassiveDNS can cache/aggregate
- duplicate DNS answers in-memory, limiting the amount of data in the
- logfile without loosing the essens in the DNS answer.
-- `sagan `__ - Sagan uses a 'Snort like'
- engine and rules to analyze logs (syslog/event
- log/snmptrap/netflow/etc).
-- `Node Security Platform `__ - Similar
- feature set to Snyk, but free in most cases, and very cheap for
- others.
-- `ntopng `__ -
- Ntopng is a network traffic probe that shows the network usage,
- similar to what the popular top Unix command does.
-- `Fibratus `__ - Fibratus is
- a tool for exploration and tracing of the Windows kernel. It is able
- to capture the most of the Windows kernel activity - process/thread
- creation and termination, file system I/O, registry, network
- activity, DLL loading/unloading and much more. Fibratus has a very
- simple CLI which encapsulates the machinery to start the kernel event
- stream collector, set kernel event filters or run the lightweight
- Python modules called filaments.
-
-IDS / IPS / Host IDS / Host IPS
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-- `Snort `__ - Snort is a free and open source
- network intrusion prevention system (NIPS) and network intrusion
- detection system (NIDS)created by Martin Roesch in 1998. Snort is now
- developed by Sourcefire, of which Roesch is the founder and CTO. In
- 2009, Snort entered InfoWorld's Open Source Hall of Fame as one of
- the "greatest [pieces of] open source software of all time".
-- `Bro `__ - Bro is a powerful network analysis
- framework that is much different from the typical IDS you may know.
-- `OSSEC `__ - Comprehensive Open Source
- HIDS. Not for the faint of heart. Takes a bit to get your head around
- how it works. Performs log analysis, file integrity checking, policy
- monitoring, rootkit detection, real-time alerting and active
- response. It runs on most operating systems, including Linux, MacOS,
- Solaris, HP-UX, AIX and Windows. Plenty of reasonable documentation.
- Sweet spot is medium to large deployments.
-- `Suricata `__ - Suricata is a high
- performance Network IDS, IPS and Network Security Monitoring engine.
- Open Source and owned by a community run non-profit foundation, the
- Open Information Security Foundation (OISF). Suricata is developed by
- the OISF and its supporting vendors.
-- `Security Onion `__ - Security Onion
- is a Linux distro for intrusion detection, network security
- monitoring, and log management. It's based on Ubuntu and contains
- Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico,
- NetworkMiner, and many other security tools. The easy-to-use Setup
- wizard allows you to build an army of distributed sensors for your
- enterprise in minutes!
-- `sshwatch `__ - IPS for SSH
- similar to DenyHosts written in Python. It also can gather
- information about attacker during the attack in a log.
-- `Stealth `__ - File integrity
- checker that leaves virtually no sediment. Controller runs from
- another machine, which makes it hard for an attacker to know that the
- file system is being checked at defined pseudo random intervals over
- SSH. Highly recommended for small to medium deployments.
-- `AIEngine `__ - AIEngine is a
- next generation interactive/programmable Python/Ruby/Java/Lua packet
- inspection engine with capabilities of learning without any human
- intervention, NIDS(Network Intrusion Detection System) functionality,
- DNS domain classification, network collector, network forensics and
- many others.
-- `Denyhosts `__ - Thwart SSH
- dictionary based attacks and brute force attacks.
-- `Fail2Ban `__ -
- Scans log files and takes action on IPs that show malicious behavior.
-- `SSHGuard `__ - A software to protect
- services in addition to SSH, written in C
-- `Lynis `__ - an open source security
- auditing tool for Linux/Unix.
-
-Honey Pot / Honey Net
-~~~~~~~~~~~~~~~~~~~~~
-
-- `awesome-honeypots `__
- - The canonical awesome honeypot list.
-- `HoneyPy `__ - HoneyPy is a low
- to medium interaction honeypot. It is intended to be easy to: deploy,
- extend functionality with plugins, and apply custom configurations.
-- `Dionaea `__ -
- Dionaea is meant to be a nepenthes successor, embedding python as
- scripting language, using libemu to detect shellcodes, supporting
- ipv6 and tls.
-- `Conpot `__ - ICS/SCADA Honeypot. Conpot is a low
- interactive server side Industrial Control Systems honeypot designed
- to be easy to deploy, modify and extend. By providing a range of
- common industrial control protocols we created the basics to build
- your own system, capable to emulate complex infrastructures to
- convince an adversary that he just found a huge industrial complex.
- To improve the deceptive capabilities, we also provided the
- possibility to server a custom human machine interface to increase
- the honeypots attack surface. The response times of the services can
- be artificially delayed to mimic the behaviour of a system under
- constant load. Because we are providing complete stacks of the
- protocols, Conpot can be accessed with productive HMI's or extended
- with real hardware. Conpot is developed under the umbrella of the
- Honeynet Project and on the shoulders of a couple of very big giants.
-- `Amun `__ - Amun Python-based
- low-interaction Honeypot.
-- `Glastopf `__ - Glastopf is a Honeypot which
- emulates thousands of vulnerabilities to gather data from attacks
- targeting web applications. The principle behind it is very simple:
- Reply the correct response to the attacker exploiting the web
- application.
-- `Kippo `__ - Kippo is a medium
- interaction SSH honeypot designed to log brute force attacks and,
- most importantly, the entire shell interaction performed by the
- attacker.
-- `Kojoney `__ - Kojoney is a low
- level interaction honeypot that emulates an SSH server. The daemon is
- written in Python using the Twisted Conch libraries.
-- `HonSSH `__ - HonSSH is a
- high-interaction Honey Pot solution. HonSSH will sit between an
- attacker and a honey pot, creating two separate SSH connections
- between them.
-- `Bifrozt `__ - Bifrozt is a
- NAT device with a DHCP server that is usually deployed with one NIC
- connected directly to the Internet and one NIC connected to the
- internal network. What differentiates Bifrozt from other standard NAT
- devices is its ability to work as a transparent SSHv2 proxy between
- an attacker and your honeypot. If you deployed an SSH server on
- Bifrozt’s internal network it would log all the interaction to a TTY
- file in plain text that could be viewed later and capture a copy of
- any files that were downloaded. You would not have to install any
- additional software, compile any kernel modules or use a specific
- version or type of operating system on the internal SSH server for
- this to work. It will limit outbound traffic to a set number of ports
- and will start to drop outbound packets on these ports when certain
- limits are exceeded.
-- `HoneyDrive `__ - HoneyDrive is the
- premier honeypot Linux distro. It is a virtual appliance (OVA) with
- Xubuntu Desktop 12.04.4 LTS edition installed. It contains over 10
- pre-installed and pre-configured honeypot software packages such as
- Kippo SSH honeypot, Dionaea and Amun malware honeypots, Honeyd
- low-interaction honeypot, Glastopf web honeypot and Wordpot, Conpot
- SCADA/ICS honeypot, Thug and PhoneyC honeyclients and more.
- Additionally it includes many useful pre-configured scripts and
- utilities to analyze, visualize and process the data it can capture,
- such as Kippo-Graph, Honeyd-Viz, DionaeaFR, an ELK stack and much
- more. Lastly, almost 90 well-known malware analysis, forensics and
- network monitoring related tools are also present in the
- distribution.
-- `Cuckoo Sandbox `__ - Cuckoo Sandbox
- is an Open Source software for automating analysis of suspicious
- files. To do so it makes use of custom components that monitor the
- behavior of the malicious processes while running in an isolated
- environment.
-
-Full Packet Capture / Forensic
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-- `tcpflow `__ - tcpflow is a
- program that captures data transmitted as part of TCP connections
- (flows), and stores the data in a way that is convenient for protocol
- analysis and debugging. Each TCP flow is stored in its own file.
- Thus, the typical TCP flow will be stored in two files, one for each
- direction. tcpflow can also process stored 'tcpdump' packet flows.
-- `Xplico `__ - The goal of Xplico is extract
- from an internet traffic capture the applications data contained. For
- example, from a pcap file Xplico extracts each email (POP, IMAP, and
- SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP,
- and so on. Xplico isn’t a network protocol analyzer. Xplico is an
- open source Network Forensic Analysis Tool (NFAT).
-- `Moloch `__ - Moloch is an open
- source, large scale IPv4 packet capturing (PCAP), indexing and
- database system. A simple web interface is provided for PCAP
- browsing, searching, and exporting. APIs are exposed that allow PCAP
- data and JSON-formatted session data to be downloaded directly.
- Simple security is implemented by using HTTPS and HTTP digest
- password support or by using apache in front. Moloch is not meant to
- replace IDS engines but instead work along side them to store and
- index all the network traffic in standard PCAP format, providing fast
- access. Moloch is built to be deployed across many systems and can
- scale to handle multiple gigabits/sec of traffic.
-- `OpenFPC `__ - OpenFPC is a set of tools that
- combine to provide a lightweight full-packet network traffic recorder
- & buffering system. It's design goal is to allow non-expert users to
- deploy a distributed network traffic recorder on COTS hardware while
- integrating into existing alert and log management tools.
-- `Dshell `__ - Dshell is
- a network forensic analysis framework. Enables rapid development of
- plugins to support the dissection of network packet captures.
-- `stenographer `__ -
- Stenographer is a packet capture solution which aims to quickly spool
- all packets to disk, then provide simple, fast access to subsets of
- those packets.
-
-Sniffer
-~~~~~~~
-
-- `wireshark `__ - Wireshark is a free and
- open-source packet analyzer. It is used for network troubleshooting,
- analysis, software and communications protocol development, and
- education. Wireshark is very similar to tcpdump, but has a graphical
- front-end, plus some integrated sorting and filtering options.
-- `netsniff-ng `__ - netsniff-ng is a free
- Linux networking toolkit, a Swiss army knife for your daily Linux
- network plumbing if you will. Its gain of performance is reached by
- zero-copy mechanisms, so that on packet reception and transmission
- the kernel does not need to copy packets from kernel space to user
- space and vice versa.
-- `Live HTTP
- headers `__
- - Live HTTP headers is a free firefox addon to see your browser
- requests in real time. It shows the entire headers of the requests
- and can be used to find the security loopholes in implementations.
-
-Security Information & Event Management
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-- `Prelude `__ - Prelude is a Universal
- "Security Information & Event Management" (SIEM) system. Prelude
- collects, normalizes, sorts, aggregates, correlates and reports all
- security-related events independently of the product brand or license
- giving rise to such events; Prelude is "agentless".
-- `OSSIM `__
- - OSSIM provides all of the features that a security professional
- needs from a SIEM offering – event collection, normalization, and
- correlation.
-- `FIR `__ - Fast Incident
- Response, a cybersecurity incident management platform.
-
-VPN
-~~~
-
-- `OpenVPN `__ - OpenVPN is an open source
- software application that implements virtual private network (VPN)
- techniques for creating secure point-to-point or site-to-site
- connections in routed or bridged configurations and remote access
- facilities. It uses a custom security protocol that utilizes SSL/TLS
- for key exchange.
-
-Fast Packet Processing
-~~~~~~~~~~~~~~~~~~~~~~
-
-- `DPDK `__ - DPDK is a set of libraries and drivers
- for fast packet processing.
-- `PFQ `__ - PFQ is a functional networking
- framework designed for the Linux operating system that allows
- efficient packets capture/transmission (10G and beyond), in-kernel
- functional processing and packets steering across sockets/end-points.
-- `PF\_RING `__ -
- PF\_RING is a new type of network socket that dramatically improves
- the packet capture speed.
-- `PF\_RING ZC (Zero
- Copy) `__
- - PF\_RING ZC (Zero Copy) is a flexible packet processing framework
- that allows you to achieve 1/10 Gbit line rate packet processing
- (both RX and TX) at any packet size. It implements zero copy
- operations including patterns for inter-process and inter-VM (KVM)
- communications.
-- `PACKET\_MMAP/TPACKET/AF\_PACKET `__
- - It's fine to use PACKET\_MMAP to improve the performance of the
- capture and transmission process in Linux.
-- `netmap `__ - netmap is a
- framework for high speed packet I/O. Together with its companion VALE
- software switch, it is implemented as a single kernel module and
- available for FreeBSD, Linux and now also Windows.
-
-Firewall
-~~~~~~~~
-
-- `pfSense `__ - Firewall and Router FreeBSD
- distribution.
-- `OPNsense `__ - is an open source, easy-to-use
- and easy-to-build FreeBSD based firewall and routing platform.
- OPNsense includes most of the features available in expensive
- commercial firewalls, and more in many cases. It brings the rich
- feature set of commercial offerings with the benefits of open and
- verifiable sources.
-- `fwknop `__ - Protects ports via
- Single Packet Authorization in your firewall.
-
-Anti-Spam
-~~~~~~~~~
-
-- `SpamAssassin `__ - A powerful and
- popular email spam filter employing a variety of detection technique.
-
-Docker Images for Penetration Testing & Security
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-- ``docker pull kalilinux/kali-linux-docker`` `official Kali
- Linux `__
-- ``docker pull owasp/zap2docker-stable`` - `official OWASP
- ZAP `__
-- ``docker pull wpscanteam/wpscan`` - `official
- WPScan `__
-- ``docker pull remnux/metasploit`` -
- `docker-metasploit `__
-- ``docker pull citizenstig/dvwa`` - `Damn Vulnerable Web Application
- (DVWA) `__
-- ``docker pull wpscanteam/vulnerablewordpress`` - `Vulnerable
- WordPress
- Installation `__
-- ``docker pull hmlio/vaas-cve-2014-6271`` - `Vulnerability as a
- service:
- Shellshock `__
-- ``docker pull hmlio/vaas-cve-2014-0160`` - `Vulnerability as a
- service:
- Heartbleed `__
-- ``docker pull opendns/security-ninjas`` - `Security
- Ninjas `__
-- ``docker pull diogomonica/docker-bench-security`` - `Docker Bench for
- Security `__
-- ``docker pull ismisepaul/securityshepherd`` - `OWASP Security
- Shepherd `__
-- ``docker pull danmx/docker-owasp-webgoat`` - `OWASP WebGoat Project
- docker
- image `__
-- ``docker-compose build && docker-compose up`` - `OWASP
- NodeGoat `__
-- ``docker pull citizenstig/nowasp`` - `OWASP Mutillidae II Web
- Pen-Test Practice
- Application `__
-
-Endpoint
---------
-
-Anti-Virus / Anti-Malware
-~~~~~~~~~~~~~~~~~~~~~~~~~
-
-- `Linux Malware
- Detect `__ - A
- malware scanner for Linux designed around the threats faced in shared
- hosted environments.
-
-Content Disarm & Reconstruct
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-- `DocBleach `__ - An
- open-source Content Disarm & Reconstruct software sanitizing Office,
- PDF and RTF Documents.
-
-Configuration Management
-~~~~~~~~~~~~~~~~~~~~~~~~
-
-- `Rudder `__ - Rudder is an easy to
- use, web-driven, role-based solution for IT Infrastructure Automation
- & Compliance. Automate common system administration tasks
- (installation, configuration); Enforce configuration over time
- (configuring once is good, ensuring that configuration is valid and
- automatically fixing it is better); Inventory of all managed nodes;
- Web interface to configure and manage nodes and their configuration;
- Compliance reporting, by configuration and/or by node.
-
-Authentication
-~~~~~~~~~~~~~~
-
-- `google-authenticator `__
- - The Google Authenticator project includes implementations of
- one-time passcode generators for several mobile platforms, as well as
- a pluggable authentication module (PAM). One-time passcodes are
- generated using open standards developed by the Initiative for Open
- Authentication (OATH) (which is unrelated to OAuth). These
- implementations support the HMAC-Based One-time Password (HOTP)
- algorithm specified in RFC 4226 and the Time-based One-time Password
- (TOTP) algorithm specified in RFC 6238. `Tutorials: How to set up
- two-factor authentication for SSH login on
- Linux `__
-
-Mobile / Android / iOS
-~~~~~~~~~~~~~~~~~~~~~~
-
-- `android-security-awesome `__
- - A collection of android security related resources. A lot of work
- is happening in academia and industry on tools to perform dynamic
- analysis, static analysis and reverse engineering of android apps.
-- `SecMobi Wiki `__ - A collection of mobile
- security resources which including articles, blogs, books, groups,
- projects, tools and conferences. \*
-- `OWASP Mobile Security Testing
- Guide `__ - A comprehensive
- manual for mobile app security testing and reverse engineering.
-- `OSX Security
- Awesome `__ - A
- collection of OSX and iOS security resources
-
-Forensics
-~~~~~~~~~
-
-- `grr `__ - GRR Rapid Response is an
- incident response framework focused on remote live forensics.
-- `Volatility `__ -
- Python based memory extraction and analysis framework.
-- `mig `__ - MIG is a platform to perform
- investigative surgery on remote endpoints. It enables investigators
- to obtain information from large numbers of systems in parallel, thus
- accelerating investigation of incidents and day-to-day operations
- security.
-- `ir-rescue `__ -
- *ir-rescue* is a Windows Batch script and a Unix Bash script to
- comprehensively collect host forensic data during incident response.
-
-Threat Intelligence
--------------------
-
-- `abuse.ch `__ - ZeuS Tracker / SpyEye Tracker
- / Palevo Tracker / Feodo Tracker tracks Command&Control servers
- (hosts) around the world and provides you a domain- and an
- IP-blocklist.
-- `Emerging Threats - Open
- Source `__
- - Emerging Threats began 10 years ago as an open source community for
- collecting Suricata and SNORT® rules, firewall rules, and other IDS
- rulesets. The open source community still plays an active role in
- Internet security, with more than 200,000 active users downloading
- the ruleset daily. The ETOpen Ruleset is open to any user or
- organization, as long as you follow some basic guidelines. Our ETOpen
- Ruleset is available for download any time.
-- `PhishTank `__ - PhishTank is a
- collaborative clearing house for data and information about phishing
- on the Internet. Also, PhishTank provides an open API for developers
- and researchers to integrate anti-phishing data into their
- applications at no charge.
-- `SBL / XBL / PBL / DBL / DROP / ROKSO `__ -
- The Spamhaus Project is an international nonprofit organization whose
- mission is to track the Internet's spam operations and sources, to
- provide dependable realtime anti-spam protection for Internet
- networks, to work with Law Enforcement Agencies to identify and
- pursue spam and malware gangs worldwide, and to lobby governments for
- effective anti-spam legislation.
-- `Internet Storm Center `__ -
- The ISC was created in 2001 following the successful detection,
- analysis, and widespread warning of the Li0n worm. Today, the ISC
- provides a free analysis and warning service to thousands of Internet
- users and organizations, and is actively working with Internet
- Service Providers to fight back against the most malicious attackers.
-- `AutoShun `__ - AutoShun is a Snort plugin
- that allows you to send your Snort IDS logs to a centralized server
- that will correlate attacks from your sensor logs with other snort
- sensors, honeypots, and mail filters from around the world.
-- `DNS-BH `__ - The DNS-BH project
- creates and maintains a listing of domains that are known to be used
- to propagate malware and spyware. This project creates the Bind and
- Windows zone files required to serve fake replies to localhost for
- any requests to these, thus preventing many spyware installs and
- reporting.
-- `AlienVault Open Threat
- Exchange `__
- - AlienVault Open Threat Exchange (OTX), to help you secure your
- networks from data loss, service disruption and system compromise
- caused by malicious IP addresses.
-- `Tor Bulk Exit
- List `__ - CollecTor,
- your friendly data-collecting service in the Tor network. CollecTor
- fetches data from various nodes and services in the public Tor
- network and makes it available to the world. If you're doing research
- on the Tor network, or if you're developing an application that uses
- Tor network data, this is your place to start. `TOR Node
- List `__ / `DNS
- Blacklists `__ / `Tor Node
- List `__
-- `leakedin.com `__ - The primary purpose of
- leakedin.com is to make visitors aware about the risks of loosing
- data. This blog just compiles samples of data lost or disclosed on
- sites like pastebin.com.
-- `FireEye OpenIOCs `__ - FireEye
- Publicly Shared Indicators of Compromise (IOCs)
-- `OpenVAS NVT Feed `__ -
- The public feed of Network Vulnerability Tests (NVTs). It contains
- more than 35,000 NVTs (as of April 2014), growing on a daily basis.
- This feed is configured as the default for OpenVAS.
-- `Project Honey Pot `__ - Project
- Honey Pot is the first and only distributed system for identifying
- spammers and the spambots they use to scrape addresses from your
- website. Using the Project Honey Pot system you can install addresses
- that are custom-tagged to the time and IP address of a visitor to
- your site. If one of these addresses begins receiving email we not
- only can tell that the messages are spam, but also the exact moment
- when the address was harvested and the IP address that gathered it.
-- `virustotal `__ - VirusTotal, a
- subsidiary of Google, is a free online service that analyzes files
- and URLs enabling the identification of viruses, worms, trojans and
- other kinds of malicious content detected by antivirus engines and
- website scanners. At the same time, it may be used as a means to
- detect false positives, i.e. innocuous resources detected as
- malicious by one or more scanners.
-- `IntelMQ `__ - IntelMQ is a
- solution for CERTs for collecting and processing security feeds,
- pastebins, tweets using a message queue protocol. It's a community
- driven initiative called IHAP (Incident Handling Automation Project)
- which was conceptually designed by European CERTs during several
- InfoSec events. Its main goal is to give to incident responders an
- easy way to collect & process threat intelligence thus improving the
- incident handling processes of CERTs. `ENSIA
- Homepage `__.
-- `CIFv2 `__ - CIF
- is a cyber threat intelligence management system. CIF allows you to
- combine known malicious threat information from many sources and use
- that information for identification (incident response), detection
- (IDS) and mitigation (null route).
-- `CriticalStack `__ - Free
- aggregated threat intel for the Bro network security monitoring
- platform.
-
-Web
----
-
-Organization
-~~~~~~~~~~~~
-
-- `OWASP `__ - The Open Web Application Security
- Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable
- organization focused on improving the security of software.
-
-Web Application Firewall
-~~~~~~~~~~~~~~~~~~~~~~~~
-
-- `ModSecurity `__ - ModSecurity is a
- toolkit for real-time web application monitoring, logging, and access
- control.
-- `NAXSI `__ - NAXSI is an
- open-source, high performance, low rules maintenance WAF for NGINX,
- NAXSI means Nginx Anti Xss & Sql Injection.
-- `sql\_firewall `__ SQL
- Firewall Extension for PostgreSQL
-- `ironbee `__ - IronBee is an open
- source project to build a universal web application security sensor.
- IronBee as a framework for developing a system for securing web
- applications - a framework for building a web application firewall
- (WAF).
-
-Scanning / Pentesting
-~~~~~~~~~~~~~~~~~~~~~
-
-- `sqlmap `__ - sqlmap is an open source
- penetration testing tool that automates the process of detecting and
- exploiting SQL injection flaws and taking over of database servers.
- It comes with a powerful detection engine, many niche features for
- the ultimate penetration tester and a broad range of switches lasting
- from database fingerprinting, over data fetching from the database,
- to accessing the underlying file system and executing commands on the
- operating system via out-of-band connections.
-- `ZAP `__
- - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration
- testing tool for finding vulnerabilities in web applications. It is
- designed to be used by people with a wide range of security
- experience and as such is ideal for developers and functional testers
- who are new to penetration testing. ZAP provides automated scanners
- as well as a set of tools that allow you to find security
- vulnerabilities manually.
-- `OWASP Testing Checklist
- v4 `__ - List of
- some controls to test during a web vulnerability assessment. Markdown
- version may be found
- `here `__.
-- `w3af `__ - w3af is a Web Application Attack and
- Audit Framework. The project’s goal is to create a framework to help
- you secure your web applications by finding and exploiting all web
- application vulnerabilities.
-- `Recon-ng `__ - Recon-ng
- is a full-featured Web Reconnaissance framework written in Python.
- Recon-ng has a look and feel similar to the Metasploit Framework.
-- `PTF `__ - The Penetration Testers
- Framework (PTF) is a way for modular support for up-to-date tools.
-- `Infection Monkey `__ - A semi
- automatic pen testing tool for mapping/pen-testing networks.
- Simulates a human attacker.
-- `ACSTIS `__ - ACSTIS
- helps you to scan certain web applications for AngularJS Client-Side
- Template Injection (sometimes referred to as CSTI, sandbox escape or
- sandbox bypass). It supports scanning a single request but also
- crawling the entire web application for the AngularJS CSTI
- vulnerability.
-
-Runtime Application Self-Protection
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-- `Sqreen `__ - Sqreen is a Runtime Application
- Self-Protection (RASP) solution for software teams. An in-app agent
- instruments and monitors the app. Suspicious user activities are
- reported and attacks are blocked at runtime without code modification
- or traffic redirection.
-
-Development
-~~~~~~~~~~~
-
-- `Secure by
- Design `__
- - Book that identifies design patterns and coding styles that make
- lots of security vulnerabilities less likely. (early access,
- published continuously, final release fall 2017)
-- `Securing DevOps `__ -
- Book that explores how the techniques of DevOps and Security should
- be applied together to make cloud services safer. (early access,
- published continuously, final release January 2018)
-- `Understanding API
- Security `__
- - Free eBook sampler that gives some context for how API security
- works in the real world by showing how APIs are put together and how
- the OAuth protocol can be used to protect them.
-- `OAuth 2 in
- Action `__ - Book
- that teaches you practical use and deployment of OAuth 2 from the
- perspectives of a client, an authorization server, and a resource
- server.
-
-Usability
----------
-
-- `Usable Security
- Course `__ - Usable
- Security course at coursera. Quite good for those looking for how
- security and usability intersects.
-
-Big Data
---------
-
-- `data\_hacking `__ -
- Examples of using IPython, Pandas, and Scikit Learn to get the most
- out of your security data.
-- `hadoop-pcap `__ - Hadoop
- library to read packet capture (PCAP) files.
-- `Workbench `__ - A scalable python
- framework for security research and development teams.
-- `OpenSOC `__ - OpenSOC integrates
- a variety of open source big data technologies in order to offer a
- centralized tool for security monitoring and analysis.
-- `Apache Metron
- (incubating) `__ - Metron
- integrates a variety of open source big data technologies in order to
- offer a centralized tool for security monitoring and analysis.
-- `Apache Spot
- (incubating) `__ - Apache
- Spot is open source software for leveraging insights from flow and
- packet analysis.
-- `binarypig `__ - Scalable
- Binary Data Extraction in Hadoop. Malware Processing and Analytics
- over Pig, Exploration through Django, Twitter Bootstrap, and
- Elasticsearch.
-
-DevOps
-------
-
-- `Securing
- DevOps `__
- - A book on Security techniques for DevOps that reviews state of the
- art practices used in securing web applications and their
- infrastructure.
-
-Operating Systems
------------------
-
-Online resources
-~~~~~~~~~~~~~~~~
-
-- `Security related Operating Systems @
- Rawsec `__ - Complete list
- of security related operating systems
-- `Best Linux Penetration Testing Distributions @
- CyberPunk `__
- - Description of main penetration testing distributions
-- `Security @
- Distrowatch `__
- - Website dedicated to talking about, reviewing and keeping up to
- date with open source operating systems
-
-Datastores
-----------
-
-- `blackbox `__ - Safely
- store secrets in a VCS repo using GPG
-- `confidant `__ - Stores secrets in
- AWS DynamoDB, encrypted at rest and integrates with IAM
-- `dotgpg `__ - A tool for
- backing up and versioning your production secrets or shared passwords
- securely and easily.
-- `redoctober `__ - Server
- for two-man rule style file encryption and decryption.
-- `aws-vault `__ - Store AWS
- credentials in the OSX Keychain or an encrypted file
-- `credstash `__ - Store secrets
- using AWS KMS and DynamoDB
-- `chamber `__ - Store secrets
- using AWS KMS and SSM Parameter Store
-- `dotgpg `__ A tool for backing
- up and versioning your production secrets or shared passwords
- securely and easily.
-- `Safe `__ - A Vault CLI that
- makes reading from and writing to the Vault easier to do.
-- `Sops `__ - An editor of encrypted
- files that supports YAML, JSON and BINARY formats and encrypts with
- AWS KMS and PGP.
-- `passbolt `__ - The password manager your
- team was waiting for. Free, open source, extensible, based on
- OpenPGP.
-- `passpie `__ - Multiplatform
- command-line password manager
-- `Vault `__ - An encrypted datastore
- secure enough to hold environment and application secrets.
-
-Other Awesome Lists
--------------------
-
-Other Security Awesome Lists
-~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
-- `Android Security
- Awesome `__ - A
- collection of android security related resources.
-- `Awesome CTF `__ - A curated
- list of CTF frameworks, libraries, resources and software.
-- `Awesome Cyber
- Skills `__ - A
- curated list of hacking environments where you can train your cyber
- skills legally and safely.
-- `Awesome Hacking `__ -
- A curated list of awesome Hacking tutorials, tools and resources.
-- `Awesome Honeypots `__
- - An awesome list of honeypot resources.
-- `Awesome Malware
- Analysis `__ - A
- curated list of awesome malware analysis tools and resources.
-- `Awesome PCAP
- Tools `__ - A
- collection of tools developed by other researchers in the Computer
- Science area to process network traces.
-- `Awesome Pentest `__ - A
- collection of awesome penetration testing resources, tools and other
- shiny things.
-- `Awesome Linux
- Containers `__ -
- A curated list of awesome Linux Containers frameworks, libraries and
- software.
-- `Awesome Incident
- Response `__ -
- A curated list of resources for incident response.
-- `Awesome Web
- Hacking `__ - This
- list is for anyone wishing to learn about web application security
- but do not have a starting point.
-- `Awesome Threat
- Intelligence `__
- - A curated list of threat intelligence resources.
-- `Awesome Pentest Cheat
- Sheets `__ -
- Collection of the cheat sheets useful for pentesting
-- `Awesome Industrial Control System
- Security `__
- - A curated list of resources related to Industrial Control System
- (ICS) security.
-- `Awesome YARA `__ - A
- curated list of awesome YARA rules, tools, and people.
-- `Awesome Threat Detection and
- Hunting `__ - A
- curated list of awesome threat detection and hunting resources.
From a5756b41309ad00fd9c0606b35200693d565b20b Mon Sep 17 00:00:00 2001
From: Maciej Michalski <5445923+spy86@users.noreply.github.com>
Date: Thu, 22 Feb 2024 20:25:02 +0100
Subject: [PATCH 4/5] Update README.md
---
README.md | 18 ++++++++++++------
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/README.md b/README.md
index 20e3d49..9a62576 100644
--- a/README.md
+++ b/README.md
@@ -1,10 +1,9 @@
-# Security Awesome
+# AwesomeSecurity
-[![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](https://opensource.org/licenses/MIT)
+Explore a curated collection of fantastic software, libraries, documents, books, and resources dedicated to security. From network and endpoint protection to threat intelligence and web security, find a comprehensive list of tools and information to enhance your security knowledge and practices.
-A collection of awesome software, libraries, documents, books, resources and cool stuff about security.
-
-- [Awesome Security](#awesome-security)
+## Table of Contents
+- [AwesomeSecurity](#AwesomeSecurity)
- [Network](#network)
- [Scanning / Pentesting](#scanning--pentesting)
- [Monitoring / Logging](#monitoring--logging)
@@ -41,7 +40,6 @@ A collection of awesome software, libraries, documents, books, resources and coo
- [Other Awesome Lists](#other-awesome-lists)
- [Other Security Awesome Lists](#other-security-awesome-lists)
- [Other Common Awesome Lists](#other-common-awesome-lists)
- - [Contributing](#contributing)
------
@@ -311,3 +309,11 @@ A collection of awesome software, libraries, documents, books, resources and coo
- [Awesome Industrial Control System Security](https://github.com/mpesen/awesome-industrial-control-system-security) - A curated list of resources related to Industrial Control System (ICS) security.
- [Awesome YARA](https://github.com/InQuest/awesome-yara) - A curated list of awesome YARA rules, tools, and people.
- [Awesome Threat Detection and Hunting](https://github.com/0x4D31/awesome-threat-detection) - A curated list of awesome threat detection and hunting resources.
+
+## License
+
+This project is licensed under the [MIT License](https://opensource.org/licenses/MIT).
+
+## Contribution
+
+Feel free to contribute by opening issues or pull requests. Your feedback and improvements are highly appreciated!
From 45ce07d1d245dabd4e1e7e74344ff9b2b5b9e347 Mon Sep 17 00:00:00 2001
From: Maciej Michalski <5445923+spy86@users.noreply.github.com>
Date: Thu, 22 Feb 2024 20:27:34 +0100
Subject: [PATCH 5/5] Update LICENSE
---
LICENSE | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/LICENSE b/LICENSE
index 4adb759..a990273 100644
--- a/LICENSE
+++ b/LICENSE
@@ -1,6 +1,6 @@
MIT License
-Copyright (c) 2024 Maciej Michalski
+Copyright (c) 2024 ThinkCube
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal