🔐
DevSec
💻 GitHub
  • 👋Welcome
    • DevSec
    • Glossary
    • Contributing
    • Discussions
  • 📖Resources
    • Articles
    • Books
    • Communities
    • Institutions
    • Conferences
    • Sites
    • Podcasts
    • Training
    • Other
  • ⚒️Tools
    • Static Analysis
    • Dynamic Analysis
    • Vulnerabilities Analysis
    • Dependency Management
    • Supply Chain
    • Secrets
      • Secrets Management
      • Secrets Scanning
    • Infrastructure as Code (IaC)
    • Other
  • 🔧Generic Development
    • Security Basics
    • Containers
    • Git & other VCS
    • Cryptography
  • ☁️Web Development
    • Generic
    • APIs
  • ☁️Cloud
    • Cloud native
    • Kubernetes
  • 😈On the other side
    • Red team
Powered by GitBook
On this page
  • Workloads
  • Infrastructure
  • Containers
  • Threat Modelling
  • SBOM
  • Packages
  • Containers
  • Firmware
  • Threat Hunting
  • Malware detection
  • Pentesting / Forensics 😈

Was this helpful?

Edit on GitHub
  1. Tools

Other

Other types of tools you may be interested in...

PreviousInfrastructure as Code (IaC)NextSecurity Basics

Last updated 1 year ago

Was this helpful?

Workloads

  • Bytedance (): an open source solution that can meet the security requirements of various workloads such as hosts, containers and K8s, and serverless.

Infrastructure

  • (): a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.

  • Chef (): an open-source testing framework for infrastructure with a human- and machine-readable language for specifying compliance, security and policy requirements.

Containers

  • ChainGuard (): Wolfi is a community Linux OS designed for the container and cloud-native era.

  • : fix the Docker and UFW security flaw without disabling iptables.

Threat Modelling

  • : the industry leader in automated threat modeling and secure software design.

  • : makes threat modeling easier for all developers through a standard notation for visualizing system components, data flows, and security boundaries.

  • : threat modeling that doesn’t scale leaves you vulnerable to attack.

  • : a modeling tool used to create threat model diagrams as part of a secure development lifecycle.

  • () (⚠️): an open source project that aims to close the gap between development and security by bringing the threat modelling process further into the development process.

SBOM

Packages

Containers

Firmware

Threat Hunting

Malware detection

    • Apps:

Pentesting / Forensics 😈

(): a wrapper around all package managers with lots of features.

Anchore : CLI tool and library for generating a Software Bill of Materials from container images and filesystem.

(): the firmware security analyzer.

(): platform Security Assessment Framework.

: Find, locate, and query files for ops and security experts.

INE (Windows): a windows log analysis framework that allows a threat hunter to find the common threats on the machine quickly. This tool also helps a threat hunter to detect APT movements.

: analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.

(⚠️): serverless, Real-time & Retroactive Malware Detection.

: project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information.

: a Workflow Engine for Offensive Security Designed to build a foundation with the capability and flexibility that allow you to run your reconnaissance system automatically.

: automating situational awareness for cloud penetration tests.

(): for basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon.

(Chinese): a mobile (Android, iOS, WEB, H5, static website) information collection and scanning tool suitable for HW action/red team/penetration testing team scenarios.

Rhino Security Lab - : Open Source AWS Exploitation Framework.

: a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities.

(): helps with conducting forensics of mobile devices in order to find signs of a potential compromise.

: exploitation Framework for Embedded Devices.

(): advanced vulnerability scanning with Nmap NSE.

(): official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty.

⚒️
Elkeid
web
Suricata
web
Inspec
web
Wolfi
web
ufw-docker
IriusRisk
Microsoft Threat Modelling Tool
SecurityCompass
OWASP Threat Dragon
Threatspec
web
Meta package manager (mpm)
web
syft
EMBA
web
chipsec
web
Recon
ThreatSeeker
VirusTotal
API Scripts & Clients
Desktop
Browser Extensions
Mobile Apps
Premium services
BinaryAlert
OWASP Nettacker
Osmedeus
CloudFox
top25-parameter
web
AppInfoScanner
Pacu
recconFTW
MVT (Mobile Verification Toolkit)
web
RouterSploit
vulscan (Nmap)
web
scan4all
web
Other author repositories