Other
Other types of tools you may be interested in...
Workloads
Infrastructure
Containers
ufw-docker: fix the Docker and UFW security flaw without disabling iptables.
Threat Modelling
IriusRisk: the industry leader in automated threat modeling and secure software design.
Microsoft Threat Modelling Tool: makes threat modeling easier for all developers through a standard notation for visualizing system components, data flows, and security boundaries.
SecurityCompass: threat modeling that doesnβt scale leaves you vulnerable to attack.
OWASP Threat Dragon: a modeling tool used to create threat model diagrams as part of a secure development lifecycle.
Threatspec (web) (β οΈ): an open source project that aims to close the gap between development and security by bringing the threat modelling process further into the development process.
SBOM
Packages
Meta package manager (mpm) (web): a wrapper around all package managers with lots of features.
Containers
Anchore syft: CLI tool and library for generating a Software Bill of Materials from container images and filesystem.
Firmware
Threat Hunting
Recon: Find, locate, and query files for ops and security experts.
INE ThreatSeeker (Windows): a windows log analysis framework that allows a threat hunter to find the common threats on the machine quickly. This tool also helps a threat hunter to detect APT movements.
Malware detection
VirusTotal: analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.
BinaryAlert (β οΈ): serverless, Real-time & Retroactive Malware Detection.
Pentesting / Forensics π
OWASP Nettacker: project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information.
Osmedeus: a Workflow Engine for Offensive Security Designed to build a foundation with the capability and flexibility that allow you to run your reconnaissance system automatically.
CloudFox: automating situational awareness for cloud penetration tests.
top25-parameter (web): for basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon.
AppInfoScanner (Chinese): a mobile (Android, iOS, WEB, H5, static website) information collection and scanning tool suitable for HW action/red team/penetration testing team scenarios.
Rhino Security Lab - Pacu: Open Source AWS Exploitation Framework.
recconFTW: a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities.
MVT (Mobile Verification Toolkit) (web): helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
RouterSploit: exploitation Framework for Embedded Devices.
vulscan (Nmap) (web): advanced vulnerability scanning with Nmap NSE.
Last updated