knowledge-base

InfoSec Resources

Tools

General

Grouped

  1. Vulnerability Assessment and Management: a. Nessus: A vulnerability scanner that identifies potential weaknesses in networks, systems, and applications. b. OpenVAS: An open-source vulnerability scanner and manager with a large database of plugins. c. Qualys: A cloud-based platform for vulnerability management, compliance, and web application security.

  2. Intrusion Detection and Prevention Systems (IDS/IPS): a. Snort: An open-source network intrusion detection and prevention system. b. Suricata: A high-performance network IDS/IPS with multi-threading capabilities. c. Zeek (formerly Bro): A powerful network security monitoring tool with deep protocol analysis.

  3. Security Information and Event Management (SIEM): a. Splunk: A data analytics platform that provides real-time monitoring, log management, and threat intelligence. b. LogRhythm: An integrated platform for threat detection, response, and compliance. c. OSSIM: An open-source SIEM solution that combines multiple security tools and intelligence feeds.

  4. Network Firewalls: a. pfSense: An open-source firewall and router solution based on FreeBSD. b. Fortinet: A range of high-performance, integrated security appliances for various network sizes. c. Cisco ASA: A series of adaptive security appliances for enterprises, providing firewall, VPN, and intrusion prevention services.

  5. Endpoint Protection: a. Microsoft Defender: An antivirus and endpoint protection solution, integrated with Windows operating systems. b. Symantec Endpoint Protection: A comprehensive endpoint security solution, providing antivirus, firewall, and intrusion prevention. c. CrowdStrike Falcon: A cloud-based endpoint protection platform, offering next-gen antivirus, endpoint detection and response (EDR), and threat intelligence.

  6. Web Application Firewalls (WAF): a. ModSecurity: An open-source WAF that protects web applications from common threats like SQL injection and cross-site scripting (XSS). b. Cloudflare: A cloud-based WAF, offering protection against DDoS attacks and other web application threats. c. Imperva: A WAF solution providing protection for applications, data, and APIs from various attack vectors.

  7. Encryption and Privacy Tools: a. OpenSSL: An open-source toolkit for implementing the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. b. GnuPG: An open-source implementation of the OpenPGP standard, allowing secure communication and data encryption. c. VeraCrypt: A free, open-source disk encryption software for protecting sensitive data.

  8. Password Management and Authentication: a. LastPass: A cloud-based password manager for securely storing and managing passwords. b. KeePass: An open-source password manager, allowing users to store and manage passwords in an encrypted database. c. Duo Security: A multi-factor authentication solution that verifies users’ identities before granting access to applications.

  9. Digital Forensics and Incident Response (DFIR): a. Autopsy: An open-source digital forensics platform for analyzing disk images, file systems, and memory dumps. b. Volatility: An open-source memory forensics framework for incident response and malware analysis. c. EnCase: A digital forensics and e-discovery software, widely used by law enforcement and corporate security teams.

  10. Penetration Testing: a. Kali Linux: A Linux distribution designed for penetration testing, with preinstalled security tools like Metasploit, Nmap.

Google Hacking

Web Mirroring / Website footprinting

Learn

Social Engineering

Vulnerability Databases