Datastores

databunker – Databunker is an address book on steroids for storing personal data. GDPR and encryption are out of the box. acra – Database security suite: proxy for data protection with transparent “on the fly” data encryption, data masking and tokenization, SQL firewall (SQL injections prevention), intrusion detection system. blackbox – Safely store secrets in […]

Threat Hunting

BeaKer – BeaKer visualizes Microsoft Sysmon network data to help threat hunters track down the source of suspicious network connections. The custom dashboard presents which users and executables created connections between two given IPs, how many times they’ve connected, the protocols and ports used, and much more..com/jpr5/ngrep Snort – Snort is a free and open […]

Monitoring / Logging

What2Log – Logging is essential in computer security. Computer logs can tell someone everything they need to know about what happened on a particular machine at a particular time. Events can be strung together to create a timeline of several events that happened during a time period. justniffer – Justniffer is a network protocol analyzer […]

Sniffer

wireshark – Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark is very similar to tcpdump, but has a graphical front-end, plus some integrated sorting and filtering options. TShark – TShark is a network protocol analyzer. It lets you capture packet […]