Compare commits

...

8 Commits

Author SHA1 Message Date
sbilly f220737cd9
Merge pull request #241 from jshlbrd/master
docs: Add Substation to Big Data, thx @jshlbrd
2023-09-03 10:56:07 +08:00
sbilly 1585b27f4d
Merge pull request #237 from lirantal/patch-2
feat: update ebooks with new Node.js Secure Coding book
2023-09-03 10:54:41 +08:00
sbilly ecc249c8ba
Merge pull request #234 from keithjjones/drkeithjones
Added blog DrKeithJones.com.
2023-09-03 10:54:20 +08:00
sbilly 30e4b0f405
Merge pull request #246 from cfpadok/develop
feat: add new tool for cognito pentest, thx @cfpadok
2023-09-03 10:45:15 +08:00
cfgs 5ec9670bc9 feat: add new tool for cognito pentest 2023-08-08 11:56:37 +02:00
jshlbrd 2b862a43fb docs: add Substation 2023-05-07 09:53:14 -07:00
Liran Tal 2df49de16a
feat: update ebooks with new Node.js Secure Coding book
Adds the hands-on practical book [Node.js Secure Coding: Defending Against Command Injection Vulnerabilities](https://www.nodejs-security.com)

Learn secure coding conventions in Node.js by executing command injection attacks on real-world npm packages and analyzing vulnerable code.
2023-04-28 12:12:29 +03:00
Keith Jones 0b9f42545f Added DrKeithJones.com. 2023-03-11 17:14:28 -05:00
1 changed files with 4 additions and 1 deletions

View File

@ -82,7 +82,7 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
- [Netz](https://github.com/spectralops/netz)- Discover internet-wide misconfigurations, using zgrab2 and others.
- [Deepfence ThreatMapper](https://github.com/deepfence/ThreatMapper) - Apache v2, powerful runtime vulnerability scanner for kubernetes, virtual machines and serverless.
- [Deepfence SecretScanner](https://github.com/deepfence/SecretScanner) - Find secrets and passwords in container images and file systems.
- [Cognito Scanner](https://github.com/padok-team/cognito-scanner) - CLI tool to pentest Cognito AWS instance. It implements three attacks: unwanted account creation, account oracle and identity pool escalation
### Monitoring / Logging
- [BoxyHQ](https://github.com/retracedhq/retraced) - Open source API for security and compliance audit logging.
@ -99,12 +99,14 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
- [Matano](https://github.com/matanolabs/matano): Open source serverless security lake platform on AWS that lets you ingest, store, and analyze petabytes of security data into an Apache Iceberg data lake and run realtime Python detections as code.
- [Falco](https://falco.org/) - The cloud-native runtime security project and de facto Kubernetes threat detection engine now part of the CNCF.
- [VAST](https://github.com/tenzir/vast) - Open source security data pipeline engine for structured event data, supporting high-volume telemetry ingestion, compaction, and retrieval; purpose-built for security content execution, guided threat hunting, and large-scale investigation.
- [Substation](https://github.com/brexhq/substation) - Substation is a cloud native data pipeline and transformation toolkit written in Go.
### IDS / IPS / Host IDS / Host IPS
- [Snort](https://www.snort.org/) - Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS)created by Martin Roesch in 1998. Snort is now developed by Sourcefire, of which Roesch is the founder and CTO. In 2009, Snort entered InfoWorld's Open Source Hall of Fame as one of the "greatest [pieces of] open source software of all time".
- [Zeek](https://zeek.org/) - Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
- [zeek2es](https://github.com/corelight/zeek2es) - An open source tool to convert Zeek logs to Elastic/OpenSearch. You can also output pure JSON from Zeek's TSV logs!
- [DrKeithJones.com](https://drkeithjones.com) - A blog on cyber security and network security monitoring.
- [OSSEC](https://ossec.github.io/) - Comprehensive Open Source HIDS. Not for the faint of heart. Takes a bit to get your head around how it works. Performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, MacOS, Solaris, HP-UX, AIX and Windows. Plenty of reasonable documentation. Sweet spot is medium to large deployments.
- [Suricata](http://suricata-ids.org/) - Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors.
- [Security Onion](http://blog.securityonion.net/) - Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Zeek, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
@ -452,6 +454,7 @@ Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technolog
- [Edge Computing Technology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications) - A book about the business and technical foundation you need to create your edge computing strategy.
- [Spring Security in Action, Second Edition](https://www.manning.com/books/spring-security-in-action-second-edition) - A book about designing and developing Spring applications that are secure right from the start.
- [Azure Security](https://www.manning.com/books/azure-security-2) - A practical guide to the native security services of Microsoft Azure.
- [Node.js Secure Coding: Defending Against Command Injection Vulnerabilities](https://www.nodejs-security.com) - Learn secure coding conventions in Node.js by executing command injection attacks on real-world npm packages and analyzing vulnerable code.
## Other Awesome Lists