🇬🇧 fabacab/awesome-cybersecurity-blueteam

A collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.

Cybersecurity blue teamsarrow-up-right are groups of individuals who identify security flaws in information technology systems, verify the effectiveness of security measures, and monitor the systems to ensure that implemented defensive measures remain effective in the future. While not exclusive, this list is heavily biased towards Free Softwarearrow-up-right projects and against proprietary products or corporate services. For offensive TTPs, please see awesome-pentestarrow-up-right.

Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Please check the Contributing Guidelinesarrow-up-right for more details. This work is licensed under a Creative Commons Attribution 4.0 International Licensearrow-up-right.

Many cybersecurity professionals enable racist state violence, wittingly or unwittingly, by providing services to local, state, and federal policing agencies or otherwise cooperating with similar institutions who do so. This evil most often happens through the coercive mechanism of employment under threat of lack of access to food, shelter, or healthcare. Despite this list's public availability, it is the maintainer's intention and hope that this list supports the people and organizations who work to counter such massive albeit banal evil.

Image of a raised fist composed of the names of Black people murdered by taxpayer-funded racist police violence.arrow-up-right

Image of a arrow-up-right

DEFUND THE POLICE.arrow-up-right

Automation

  • Ansible Lockdownarrow-up-right - Curated collection of information security themed Ansible roles that are both vetted and actively maintained.

  • Clevisarrow-up-right - Plugable framework for automated decryption, often used as a Tang client.

  • DShellarrow-up-right - Extensible network forensic analysis framework written in Python that enables rapid development of plugins to support the dissection of network packet captures.

  • Dev-Sec.ioarrow-up-right - Server hardening framework providing Ansible, Chef, and Puppet implementations of various baseline security configurations.

  • peepdfarrow-up-right - Scriptable PDF file analyzer.

  • PyREBoxarrow-up-right - Python-scriptable reverse engineering sandbox, based on QEMU.

  • Watchtowerarrow-up-right - Container-based solution for automating Docker container base image updates, providing an unattended upgrade experience.

Code libraries and bindings

Security Orchestration, Automation, and Response (SOAR)

See also Security Information and Event Management (SIEM), and IR management consoles.

  • Shufflearrow-up-right - Graphical generalized workflow (automation) builder for IT professionals and blue teamers.

Cloud platform security

See also asecure.cloud/toolsarrow-up-right.

  • Checkovarrow-up-right - Static analysis for Terraform (infrastructure as code) to help detect CIS policy violations and prevent cloud security misconfiguration.

  • Falcoarrow-up-right - Behavioral activity monitor designed to detect anomalous activity in containerized applications, hosts, and network packet flows by auditing the Linux kernel and enriched by runtime data such as Kubernetes metrics.

  • Istioarrow-up-right - Open platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data.

  • Kata Containersarrow-up-right - Secure container runtime with lightweight virtual machines that feel and perform like containers, but provide stronger workload isolation using hardware virtualization technology as a second layer of defense.

  • Managed Kubernetes Inspection Tool (MKIT)arrow-up-right - Query and validate several common security-related configuration settings of managed Kubernetes cluster objects and the workloads/resources running inside the cluster.

  • Prowlerarrow-up-right - Tool based on AWS-CLI commands for Amazon Web Services account security assessment and hardening.

  • Scout Suitearrow-up-right - Open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments.

  • gVisorarrow-up-right - Application kernel, written in Go, that implements a substantial portion of the Linux system surface to provide an isolation boundary between the application and the host kernel.

Communications security (COMSEC)

See also Transport-layer defenses.

  • GPG Syncarrow-up-right - Centralize and automate OpenPGP public key distribution, revocation, and updates amongst all members of an organization or team.

  • Geneva (Genetic Evasion)arrow-up-right - Novel experimental genetic algorithm that evolves packet-manipulation-based censorship evasion strategies against nation-state level censors to increase availability of otherwise blocked content.

DevSecOps

See also awesome-devsecopsarrow-up-right.

  • Banearrow-up-right - Custom and better AppArmor profile generator for Docker containers.

  • BlackBoxarrow-up-right - Safely store secrets in Git/Mercurial/Subversion by encrypting them "at rest" using GnuPG.

  • Ciliumarrow-up-right - Open source software for transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes.

  • Clairarrow-up-right - Static analysis tool to probe for vulnerabilities introduced via application container (e.g., Docker) images.

  • CodeQLarrow-up-right - Discover vulnerabilities across a codebase by performing queries against code as though it were data.

  • DefectDojoarrow-up-right - Application vulnerability management tool built for DevOps and continuous security integration.

  • Gauntltarrow-up-right - Pentest applications during routine continuous integration build pipelines.

  • Git Secretsarrow-up-right - Prevents you from committing passwords and other sensitive information to a git repository.

  • SOPSarrow-up-right - Editor of encrypted files that supports YAML, JSON, ENV, INI and binary formats and encrypts with AWS KMS, GCP KMS, Azure Key Vault, and PGP.

  • Snykarrow-up-right - Finds and fixes vulnerabilities and license violations in open source dependencies and container images.

  • SonarQubearrow-up-right - Continuous inspection tool that provides detailed reports during automated testing and alerts on newly introduced security vulnerabilities.

  • Trivyarrow-up-right - Simple and comprehensive vulnerability scanner for containers and other artifacts, suitable for use in continuous integration pipelines.

  • Vaultarrow-up-right - Tool for securely accessing secrets such as API keys, passwords, or certificates through a unified interface.

  • git-cryptarrow-up-right - Transparent file encryption in git; files which you choose to protect are encrypted when committed, and decrypted when checked out.

Application or Binary Hardening

  • DynInstarrow-up-right - Tools for binary instrumentation, analysis, and modification, useful for binary patching.

  • DynamoRIOarrow-up-right - Runtime code manipulation system that supports code transformations on any part of a program, while it executes, implemented as a process-level virtual machine.

  • Egalitoarrow-up-right - Binary recompiler and instrumentation framework that can fully disassemble, transform, and regenerate ordinary Linux binaries designed for binary hardening and security research.

  • Valgrindarrow-up-right - Instrumentation framework for building dynamic analysis tools.

Compliance testing and reporting

  • Chef InSpecarrow-up-right - Language for describing security and compliance rules, which become automated tests that can be run against IT infrastructures to discover and report on non-compliance.

  • OpenSCAP Basearrow-up-right - Both a library and a command line tool (oscap) used to evaluate a system against SCAP baseline profiles to report on the security posture of the scanned system(s).

Fuzzing

See also Awesome-Fuzzingarrow-up-right.

Policy enforcement

  • OpenPolicyAgentarrow-up-right - Unified toolset and framework for policy across the cloud native stack.

  • Tangarrow-up-right - Server for binding data to network presence; provides data to clients only when they are on a certain (secured) network.

Honeypots

See also awesome-honeypotsarrow-up-right.

Tarpits

  • Endlessharrow-up-right - SSH tarpit that slowly sends an endless banner.

  • LaBreaarrow-up-right - Program that answers ARP requests for unused IP space, creating the appearance of fake machines that answer further requests very slowly in order to slow down scanners, worms, etcetera.

Host-based tools

Sandboxes

  • Firejailarrow-up-right - SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf.

Incident Response tools

See also awesome-incident-responsearrow-up-right.

IR management consoles

See also Security Orchestration, Automation, and Response (SOAR).

  • CIRTKitarrow-up-right - Scriptable Digital Forensics and Incident Response (DFIR) toolkit built on Viper.

  • Fast Incident Response (FIR)arrow-up-right - Cybersecurity incident management platform allowing for easy creation, tracking, and reporting of cybersecurity incidents.

  • Rekallarrow-up-right - Advanced forensic and incident response framework.

  • TheHivearrow-up-right - Scalable, free Security Incident Response Platform designed to make life easier for SOCs, CSIRTs, and CERTs, featuring tight integration with MISP.

  • threat_notearrow-up-right - Web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related to their research.

Evidence collection

Network perimeter defenses

Firewall appliances or distributions

Operating System distributions

Phishing awareness and reporting

See also awesome-pentest § Social Engineering Toolsarrow-up-right.

Preparedness training and wargaming

(Also known as adversary emulation, threat simulation, or similar.)

Security monitoring

Endpoint Detection and Response (EDR)

  • Wazuharrow-up-right - Open source, multiplatform agent-based security monitoring based on a fork of OSSEC HIDS.

Network Security Monitoring (NSM)

See also awesome-pcaptoolsarrow-up-right.

  • ChopShoparrow-up-right - Framework to aid analysts in the creation and execution of pynids-based decoders and detectors of APT tradecraft.

  • Maltrailarrow-up-right - Malicious network traffic detection system.

  • Molocharrow-up-right - Augments your current security infrastructure to store and index network traffic in standard PCAP format, providing fast, indexed access.

  • OwlHarrow-up-right - Helps manage network IDS at scale by visualizing Suricata, Zeek, and Moloch life cycles.

  • Real Intelligence Threat Analysis (RITA)arrow-up-right - Open source framework for network traffic analysis that ingests Zeek logs and detects beaconing, DNS tunneling, and more.

  • Respounderarrow-up-right - Detects the presence of the Responder LLMNR/NBT-NS/MDNS poisoner on a network.

  • Snortarrow-up-right - Widely-deployed, Free Software IPS capable of real-time packet analysis, traffic logging, and custom rule-based triggers.

  • SpoofSpotterarrow-up-right - Catch spoofed NetBIOS Name Service (NBNS) responses and alert to an email or log file.

  • Stenographerarrow-up-right - Full-packet-capture utility for buffering packets to disk for intrusion detection and incident response purposes.

  • Suricataarrow-up-right - Free, cross-platform, IDS/IPS with on- and off-line analysis modes and deep packet inspection capabilities that is also scriptable with Lua.

  • Tsunamiarrow-up-right - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.

  • VASTarrow-up-right - Free and open-source network telemetry engine for data-driven security investigations.

  • Wiresharkarrow-up-right - Free and open-source packet analyzer useful for network troubleshooting or forensic netflow analysis.

  • Zeekarrow-up-right - Powerful network analysis framework focused on security monitoring, formerly known as Bro.

  • netsniff-ngarrow-up-right - Free and fast GNU/Linux networking toolkit with numerous utilities such as a connection tracking tool (flowtop), traffic generator (trafgen), and autonomous system (AS) trace route utility (astraceroute).

Security Information and Event Management (SIEM)

  • AlienVault OSSIMarrow-up-right - Single-server open source SIEM platform featuring asset discovery, asset inventorying, behavioral monitoring, and event correlation, driven by AlienVault Open Threat Exchange (OTX).

  • Prelude SIEM OSSarrow-up-right - Open source, agentless SIEM with a long history and several commercial variants featuring security event collection, normalization, and alerting from arbitrary log input and numerous popular monitoring tools.

Service and performance monitoring

See also awesome-sysadmin#monitoringarrow-up-right.

  • Icingaarrow-up-right - Modular redesign of Nagios with pluggable user interfaces and an expanded set of data connectors, collectors, and reporting tools.

  • Locustarrow-up-right - Open source load testing tool in which you can define user behaviour with Python code and swarm your system with millions of simultaneous users.

  • Nagiosarrow-up-right - Popular network and service monitoring solution and reporting platform.

  • OpenNMSarrow-up-right - Free and feature-rich networking monitoring system supporting multiple configurations, a variety of alerting mechanisms (email, XMPP, SMS), and numerous data collection methods (SNMP, HTTP, JDBC, etc).

  • osqueryarrow-up-right - Operating system instrumentation framework for macOS, Windows, and Linux, exposing the OS as a high-performance relational database that can be queried with a SQL-like syntax.

  • Zabbixarrow-up-right - Mature, enterprise-level platform to monitor large-scale IT environments.

Threat hunting

(Also known as hunt teaming and threat detection.)

See also awesome-threat-detectionarrow-up-right.

  • CimSweeparrow-up-right - Suite of CIM/WMI-based tools enabling remote incident response and hunting operations across all versions of Windows.

  • DeepBlueCLIarrow-up-right - PowerShell module for hunt teaming via Windows Event logs.

  • GRR Rapid Responsearrow-up-right - Incident response framework focused on remote live forensics consisting of a Python agent installed on assets and Python-based server infrastructure enabling analysts to quickly triage attacks and perform analysis remotely.

  • Hunting ELK (HELK)arrow-up-right - All-in-one Free Software threat hunting stack based on Elasticsearch, Logstash, Kafka, and Kibana with various built-in integrations for analytics including Jupyter Notebook.

  • MozDefarrow-up-right - Automate the security incident handling process and facilitate the real-time activities of incident handlers.

  • PSHuntarrow-up-right - PowerShell module designed to scan remote endpoints for indicators of compromise or survey them for more comprehensive information related to state of those systems.

  • PSReconarrow-up-right - PSHunt-like tool for analyzing remote Windows systems that also produces a self-contained HTML report of its findings.

  • PowerForensicsarrow-up-right - All in one PowerShell-based platform to perform live hard disk forensic analysis.

  • rastrea2rarrow-up-right - Multi-platform tool for triaging suspected IOCs on many endpoints simultaneously and that integrates with antivirus consoles.

  • Redlinearrow-up-right - Freeware endpoint auditing and analysis tool that provides host-based investigative capabilities, offered by FireEye, Inc.

Threat intelligence

See also awesome-threat-intelligencearrow-up-right.

  • Active Directory Control Pathsarrow-up-right - Visualize and graph Active Directory permission configs ("control relations") to audit questions such as "Who can read the CEO's email?" and similar.

  • AttackerKBarrow-up-right - Free and public crowdsourced vulnerability assessment platform to help prioritize high-risk patch application and combat vulnerability fatigue.

  • DATAarrow-up-right - Credential phish analysis and automation tool that can accept suspected phishing URLs directly or trigger on observed network traffic containing such a URL.

  • Foragerarrow-up-right - Multi-threaded threat intelligence gathering built with Python3 featuring simple text-based configuration and data storage for ease of use and data portability.

  • GRASSMARLINarrow-up-right - Provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) by passively mapping, accounting for, and reporting on your ICS/SCADA network topology and endpoints.

  • MLSec Combinearrow-up-right - Gather and combine multiple threat intelligence feed sources into one customizable, standardized CSV-based format.

  • Malware Information Sharing Platform and Threat Sharing (MISP)arrow-up-right - Open source software solution for collecting, storing, distributing and sharing cyber security indicators.

  • ThreatIngestorarrow-up-right - Extendable tool to extract and aggregate IOCs from threat feeds including Twitter, RSS feeds, or other sources.

  • Unfetterarrow-up-right - Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework.

  • Viperarrow-up-right - Binary analysis and management framework enabling easy organization of malware and exploit samples.

Tor Onion service defenses

See also awesome-torarrow-up-right.

  • OnionBalancearrow-up-right - Provides load-balancing while also making Onion services more resilient and reliable by eliminating single points-of-failure.

  • Vanguardsarrow-up-right - Version 3 Onion service guard discovery attack mitigation script (intended for eventual inclusion in Tor core).

Transport-layer defenses

  • Certbotarrow-up-right - Free tool to automate the issuance and renewal of TLS certificates from the LetsEncrypt Root CAarrow-up-right with plugins that configure various Web and e-mail server software.

  • MITMEnginearrow-up-right - Golang library for server-side detection of TLS interception events.

  • OpenVPNarrow-up-right - Open source, SSL/TLS-based virtual private network (VPN).

  • Torarrow-up-right - Censorship circumvention and anonymizing overlay network providing distributed, cryptographically verified name services (.onion domains) to enhance publisher privacy and service availability.

macOS-based defenses

See also drduh/macOS-Security-and-Privacy-Guidearrow-up-right.

  • BlockBlockarrow-up-right - Monitors common persistence locations and alerts whenever a persistent component is added, which helps to detect and prevent malware installation.

  • LuLuarrow-up-right - Free macOS firewall.

  • Santaarrow-up-right - Keep track of binaries that are naughty or nice in an allow/deny-listing system for macOS.

  • Strongholdarrow-up-right - Easily configure macOS security settings from the terminal.

  • macOS Fortressarrow-up-right - Automated configuration of kernel-level, OS-level, and client-level security features including privatizing proxying and anti-virus scanning for macOS.

Windows-based defenses

See also awesome-windows#securityarrow-up-right and awesome-windows-domain-hardeningarrow-up-right.

License

CC-BYarrow-up-right

This work is licensed under a Creative Commons Attribution 4.0 International Licensearrow-up-right.

Mis à jour

Ce contenu vous a-t-il été utile ?