A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
Go to file
2018-08-05 17:35:00 -04:00
.gitignore Initial commit. 2018-07-23 15:14:42 -04:00
.travis.yml Initial commit. 2018-07-23 15:14:42 -04:00
CONTRIBUTING.md Initial commit. 2018-07-23 15:14:42 -04:00
README.md Add several more automation and Windows-based tools. 2018-08-05 17:35:00 -04:00

Awesome Cybersecurity Blue Team Awesome

A collection of awesome resources, tool, and other shiny things for cybersecurity blue teams.

Cybersecurity blue teams are groups of individuals who identify security flaws in information technology systems, verify the effectiveness of security measures, and monitor the systems to ensure that implemented defensive measures remain effective in the future. For offensive TTPs, please see awesome-pentest.

Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Please check the Contributing Guidelines for more details. This work is licensed under a Creative Commons Attribution 4.0 International License.

Contents

Automation

  • Autosnort - Series of bash shell scripts designed to install a fully functional, fully updated stand-alone snort sensor with an IDS event review console of your choice, on a variety of Linux distributions.
  • MLSec Combine - Gather and combine multiple threat intelligence feed sources into one customizable, standardized CSV-based format.
  • Posh-VirusTotal - PowerShell interface to VirusTotal.com APIs.
  • Sticky Keys Slayer - Establishes a Windows RDP session from a list of hostnames and scans for accessibility tools backdoors, alerting if one is discovered.
  • Windows Secure Host Baseline - Group Policy objects, compliance checks, and configuration tools that provide an automated and flexible approach for securely deploying and maintaining the latest releases of Windows 10.

Firewalling distributions

  • OPNsense - FreeBSD based firewall and routing platform.
  • pfSense - Firewall and router FreeBSD distribution.

Honeypots

See also awesome-honeypots.

Host-based tools

  • Artillery - Combination honeypot, filesystem monitor, and alerting system designed to protect Linux and Windows operating systems.
  • Fail2Ban - Intrusion prevention software framework that protects computer servers from brute-force attacks.

Incident Response (IR) tools

See also awesome-incident-response.

  • CIRTKit - Scriptable Digital Forensics and Incident Response (DFIR) toolkit built on Viper.
  • CimSweep - Suite of CIM/WMI-based tools enabling remote incident response and hunting operations across all versions of Windows.
  • GRR Rapid Response - Incident response framework focused on remote live forensics consisting of a Python agent installed on assets and Python-based server infrastructure enabling analysts to quickly triage attacks and perform analysis remotely.
  • OSXCollector - Forensic evidence collection & analysis toolkit for OSX.
  • PSHunt - PowerShell module designed to scan remote endpoints for indicators of compromise or survey them for more comprehensive information related to state of those systems.
  • PowerForensics - All in one PowerShell-based plaall in one platform for live disk forensic analysis tform for live hard disk forensic analysis.
  • ir-rescue - Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.

Network Security Monitoring (NSM)

  • Bro - Powerful network analysis framework focused on security monitoring.
  • ChopShop - Framework to aid analysts in the creation and execution of pynids-based decoders and detectors of APT tradecraft.
  • Maltrail - Malicious network traffic detection system.
  • Respounder - Detects the presence of the Responder LLMNR/NBT-NS/MDNS poisoner on a network.
  • Security Monkey - Monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations.
  • Snort - Widely-deployed, Free Software IPS capable of real-time packet analysis, traffic logging, and custom rule-based triggers.
  • SpoofSpotter - Catch spoofed NetBIOS Name Service (NBNS) responses and alert to an email or log file.
  • Suricata - Free, cross-platform, IDS/IPS with on- and off-line analysis modes and deep packet inspection capabilities that is also scriptable with Lua.
  • Wireshark - Free and open-source packet analyzer useful for network troubleshooting or forensic netflow analysis.
  • netsniff-ng - Free and fast GNU/Linux networking toolkit with numerous utilities such as a connection tracking tool (flowtop), traffic generator (trafgen), and autonomous system (AS) trace route utility (astraceroute).

Network perimeter defenses

  • fwknop - Protects ports via Single Packet Authorization in your firewall.

Practice, training, and drills

  • DumpsterFire - Modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events for Blue Team drills and sensor/alert mapping.

Security Information and Event Management (SIEM)

  • AlienVault OSSIM - Single-server open source SIEM platform featuring asset discovery, asset inventorying, behavioral monitoring, and event correlation, driven by AlienVault Open Threat Exchange (OTX).
  • Fast Incident Response (FIR) - Cybersecurity incident management platform allowing for easy creation, tracking, and reporting of cybersecurity incidents.
  • Prelude SIEM OSS - Open source, agentless SIEM with a long history and several commercial variants featuring security event collection, normalization, and alerting from arbitrary log input and numerous popular monitoring tools.

Service and performance monitoring

  • Icinga - Modular redesign of Nagios with pluggable user interfaces and an expanded set of data connectors, collectors, and reporting tools.
  • Nagios - Popular network and service monitoring solution and reporting platform.
  • OpenNMS - Free and feature-rich networking monitoring system supporting multiple configurations, a variety of alerting mechanisms (email, XMPP, SMS), and numerous data collection methods (SNMP, HTTP, JDBC, etc).
  • osquery - Operating system instrumentation framework for macOS, Windows, and Linux, exposing the OS as a high-performance relational database that can be queried with a SQL-like syntax.

Threat intelligence, analytics, and reporting

  • Active Directory Control Paths - Visualize and graph Active Directory permission configs ("control relations") to audit questions such as "Who can read the CEO's email?"
  • DATA - Credential phish analysis and automation tool that can acccept suspected phishing URLs directly or trigger on observed network traffic containing such a URL.
  • Forager - Multi-threaded threat intelligence gathering built with Python3 featuring simple text-based configuration and data storage for ease of use and data portability.
  • GRASSMARLIN - Provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) by passively mapping, accounting for, and reporting on your ICS/SCADA network topology and endpoints.
  • Malware Information Sharing Platform and Threat Sharing (MISP) - Open source software solution for collecting, storing, distributing and sharing cyber security indicators.
  • Unfetter - Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework.
  • Viper - Binary analysis and management framework enabling easy organization of malware and exploit samples.
  • threat_note - Web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related to their research.

Tor Onion service defenses

  • OnionBalance - Provides load-balancing while also making Onion services more resilient and reliable by eliminating single points-of-failure.
  • Vanguards - Version 3 Onion service guard discovery attack mitigation script (intended for eventual inclusion in Tor core).

Transport-layer defenses

  • OpenVPN - Open source, SSL/TLS-based virtual private network (VPN).

Windows-based defenses

  • HardenTools - Utility that disables a number of risky Windows features.
  • NotRuler - Detect both client-side rules and VBScript enabled forms used by the Ruler attack tool when attempting to compromise a Microsoft Exchange server.
  • WMI Monitor - Log newly created WMI consumers and processes to the Windows Application event log.
  • DeepBlueCLI - PowerShell module for hunt teaming via Windows Event logs.

License

CC-BY

This work is licensed under a Creative Commons Attribution 4.0 International License.