NIST Cybersecurity Framework – NIST is considered the gold standard for cybersecurity frameworks, use this guide to inform your businesses cyber framework. SANS Cybersecurity Policies – Free to use policies and procedures covering most topics in information security. Frequently Asked Questions (NIST) – Learn more about how the NIST framework works and how you can […]
Redcloud – A automated Red Team Infrastructure deployment using Docker. Axiom – Axiom is a dynamic infrastructure framework to efficiently work with multi-cloud environments, build and deploy repeatable infrastructure focussed on offensive and defensive security. Red Team Toolkit – Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools […]
sqlmap – sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching […]
grr – GRR Rapid Response is an incident response framework focused on remote live forensics. Volatility – Python based memory extraction and analysis framework. mig – MIG is a platform to perform investigative surgery on remote endpoints. It enables investigators to obtain information from large numbers of systems in parallel, thus accelerating investigation of incidents […]
DocBleach – An open-source Content Disarm & Reconstruct software sanitizing Office, PDF and RTF Documents. ExeFilter – an open-source tool and framework to filter files and active content. CIRCLean– CIRCLean is an independent hardware solution to clean documents from untrusted (obtained) USB keys / USB sticks.
OpenVAS – OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. Metasploit Framework – A tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research. Kali – Kali Linux is […]