A collection of awesome software, libraries, documents, books, resources and cool stuff about security.

Inspired by awesome-phpawesome-python.

Thanks to all contributors, you’re awesome and wouldn’t be possible without you! The goal is to build a categorized community-driven collection of very well-known resources.

Network

Network Architecture

  • Network-segmentation-cheat-sheet – This project was created to publish the best practices for segmentation of the corporate network of any company.
  • In general, the schemes in this project are suitable for any company.

Scanning / Pentesting

  • OpenVAS – OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.
  • Metasploit Framework – A tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.
  • Kali – Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. Kali Linux is preinstalled with numerous penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), and Aircrack-ng (a software suite for penetration-testing wireless LANs).
  • tsurugi – heavily customized Linux distribution that designed to support DFIR investigations, malware analysis and OSINT activities. It is based on Ubuntu 20.04(64-bit with a 5.15.12 custom kernel)
  • pig – A Linux packet crafting tool.
  • scapy – Scapy: the python-based interactive packet manipulation program & library.
  • Pompem – Pompem is an open source tool, which is designed to automate the search for exploits in major databases. Developed in Python, has a system of advanced search, thus facilitating the work of pentesters and ethical hackers. In its current version, performs searches in databases: Exploit-db, 1337day, Packetstorm Security…
  • Nmap – Nmap is a free and open source utility for network discovery and security auditing.
  • Amass – Amass performs DNS subdomain enumeration by scraping the largest number of disparate data sources, recursive brute forcing, crawling of web archives, permuting and altering names, reverse DNS sweeping and other techniques.
  • Anevicon – The most powerful UDP-based load generator, written in Rust.
  • Finshir – A coroutines-driven Low & Slow traffic generator, written in Rust.
  • Legion – Open source semi-automated discovery and reconnaissance network penetration testing framework.
  • Sublist3r – Fast subdomains enumeration tool for penetration testers
  • RustScan – Faster Nmap scanning with Rust. Take a 17 minute Nmap scan down to 19 seconds.
  • Boofuzz – Fuzzing engine and fuzz testing framework.
  • monsoon – Very flexible and fast interactive HTTP enumeration/fuzzing.
  • Netz– Discover internet-wide misconfigurations, using zgrab2 and others.
  • Deepfence ThreatMapper – Apache v2, powerful runtime vulnerability scanner for kubernetes, virtual machines and serverless.
  • Deepfence SecretScanner – Find secrets and passwords in container images and file systems.
  • Cognito Scanner – CLI tool to pentest Cognito AWS instance. It implements three attacks: unwanted account creation, account oracle and identity pool escalation

Monitoring / Logging

  • BoxyHQ – Open source API for security and compliance audit logging.
  • justniffer – Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way, can emulate Apache web server log files, track response times and extract all “intercepted” files from the HTTP traffic.
  • httpry – httpry is a specialized packet sniffer designed for displaying and logging HTTP traffic. It is not intended to perform analysis itself, but to capture, parse, and log the traffic for later analysis. It can be run in real-time displaying the traffic as it is parsed, or as a daemon process that logs to an output file. It is written to be as lightweight and flexible as possible, so that it can be easily adaptable to different applications.
  • ngrep – ngrep strives to provide most of GNU grep’s common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. It currently recognizes IPv4/6, TCP, UDP, ICMPv4/6, IGMP and Raw across Ethernet, PPP, SLIP, FDDI, Token Ring and null interfaces, and understands BPF filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.
  • passivedns – A tool to collect DNS records passively to aid Incident handling, Network Security Monitoring (NSM) and general digital forensics. PassiveDNS sniffs traffic from an interface or reads a pcap-file and outputs the DNS-server answers to a log file. PassiveDNS can cache/aggregate duplicate DNS answers in-memory, limiting the amount of data in the logfile without loosing the essens in the DNS answer.
  • sagan – Sagan uses a ‘Snort like’ engine and rules to analyze logs (syslog/event log/snmptrap/netflow/etc).
  • ntopng – Ntopng is a network traffic probe that shows the network usage, similar to what the popular top Unix command does.
  • Fibratus – Fibratus is a tool for exploration and tracing of the Windows kernel. It is able to capture the most of the Windows kernel activity – process/thread creation and termination, file system I/O, registry, network activity, DLL loading/unloading and much more. Fibratus has a very simple CLI which encapsulates the machinery to start the kernel event stream collector, set kernel event filters or run the lightweight Python modules called filaments.
  • opensnitch – OpenSnitch is a GNU/Linux port of the Little Snitch application firewall
  • wazuh – Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of monitoring file system changes, system calls and inventory changes.
  • Matano: Open source serverless security lake platform on AWS that lets you ingest, store, and analyze petabytes of security data into an Apache Iceberg data lake and run realtime Python detections as code.
  • Falco – The cloud-native runtime security project and de facto Kubernetes threat detection engine now part of the CNCF.
  • VAST – Open source security data pipeline engine for structured event data, supporting high-volume telemetry ingestion, compaction, and retrieval; purpose-built for security content execution, guided threat hunting, and large-scale investigation.
  • Substation – Substation is a cloud native data pipeline and transformation toolkit written in Go.

IDS / IPS / Host IDS / Host IPS

  • Snort – Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS)created by Martin Roesch in 1998. Snort is now developed by Sourcefire, of which Roesch is the founder and CTO. In 2009, Snort entered InfoWorld’s Open Source Hall of Fame as one of the “greatest [pieces of] open source software of all time”.
  • Zeek – Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
    • zeek2es – An open source tool to convert Zeek logs to Elastic/OpenSearch. You can also output pure JSON from Zeek’s TSV logs!
  • DrKeithJones.com – A blog on cyber security and network security monitoring.
  • OSSEC – Comprehensive Open Source HIDS. Not for the faint of heart. Takes a bit to get your head around how it works. Performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, MacOS, Solaris, HP-UX, AIX and Windows. Plenty of reasonable documentation. Sweet spot is medium to large deployments.
  • Suricata – Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors.
  • Security Onion – Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It’s based on Ubuntu and contains Snort, Suricata, Zeek, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
  • sshwatch – IPS for SSH similar to DenyHosts written in Python. It also can gather information about attacker during the attack in a log.
  • Stealth – File integrity checker that leaves virtually no sediment. Controller runs from another machine, which makes it hard for an attacker to know that the file system is being checked at defined pseudo random intervals over SSH. Highly recommended for small to medium deployments.
  • AIEngine – AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua packet inspection engine with capabilities of learning without any human intervention, NIDS(Network Intrusion Detection System) functionality, DNS domain classification, network collector, network forensics and many others.
  • Denyhosts – Thwart SSH dictionary based attacks and brute force attacks.
  • Fail2Ban – Scans log files and takes action on IPs that show malicious behavior.
  • SSHGuard – A software to protect services in addition to SSH, written in C
  • Lynis – an open source security auditing tool for Linux/Unix.
  • CrowdSec – CrowdSec is a free, modern & collaborative behavior detection engine, coupled with a global IP reputation network. It stacks on Fail2Ban’s philosophy but is IPV6 compatible and 60x faster (Go vs Python), uses Grok patterns to parse logs and YAML scenario to identify behaviors. CrowdSec is engineered for modern Cloud / Containers / VM based infrastructures (by decoupling detection and remediation). Once detected, you can remedy threats with various bouncers (firewall block, nginx http 403, Captchas, etc.) while the aggressive IPs can be sent to CrowdSec for curation before being shared among all users to further strengthen the community
  • wazuh – Wazuh is a free and open source XDR platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. Great tool foor all kind of deployments, it includes SIEM capabitilies (indexing + searching + WUI).