Cybersecurity Tools and Engineering

A curated collection of cybersecurity tools and resources (often open-source) that we use, find useful, or are just plain interesting.

đź’ˇ
Faster updates
We add new items here from time to time when time permits from our (free) weekly CyberSecurity.PH email-list. You can also subscribe to find out about new tools as soon as we write about them!

Cloud Security

Development / DevSecOps

  • Bearer - Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks - https://github.com/Bearer/bearer
  • Infisical - an open-source secret management platform for DevOps teams, Sync secrets across your team/infrastructure and prevent secret leaks https://github.com/Infisical/infisical
  • Poutine - a security scanner to detect misconfigurations and vulnerabilities in the CI/CD pipelines of a repository, supporting GitHub Actions and Gitlab CI/CD - https://github.com/boostsecurityio/poutine
  • pre-commit - An awesome framework for managing and maintaining multi-language pre-commit hooks, automate your application security controls - https://github.com/pre-commit/pre-commit
  • Pyimps - Quickly see python imports in terminal in a tree view - while Pyimps is not directly a cybersecurity tool it provides Python project observability that enables better code-supply-chain outcomes - https://github.com/bedbad/pyimps
  • Safety CLI - Python dependency vulnerability scanner to detect packages with known vulnerabilities and malicious packages in local development environments, CI/CD, and production systems - https://pypi.org/project/safety/
  • cak/secure - a lightweight package that adds optional security headers for Python web frameworks like FastAPI and others. - https://github.com/cak/secure
  • Trufflehog - Scan your source code repositories for secrets that should not be in your source code in the first place. Use as a Github Action (or other repo trigger) to automatically alert you when accidents with secrets happen - github.com/trufflesecurity/trufflehog
  • AI Exploits - A collection of real world AI/ML exploits for responsibly disclosed vulnerabilities, the team at Protect AI have done a good job here in building a collection of exploits to help cybersecurity practitioners to understand and prevent them - https://github.com/protectai/ai-exploits
  • garak - an "nmap" for AI/LLM; checks if an LLM can be made to fail in a way we don't typically want. Probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses - https://github.com/leondz/garak
  • PentestGPT - Penetration testing with ChatGPT assistance, not quite prime time ready but tools like this are showing up quickly - https://github.com/GreyDGL/PentestGPT
  • Substrate - a powerful open-source framework using LLM technologies for reverse engineering human understanding and meaning; Substrate is another project from Daniel Miessler and the application of his new project Substrate provides a powerful tool to deal with mis-information, dis-information, fraud and narrative bending operations - https://github.com/human-substrate/Substrate

Logging and Observability

  • Hoop - an access gateway for databases and servers so you can keep control of what your technical and engineering staff do with your databases; enables features that databases do not usually have such as SSO auth, session recording, just in time access grants - https://github.com/hoophq/hoop
  • Kunai - Kunai is a threat-hunting and observability tool for Linux, you can think of it as a kind-of Windows-Sysmon equivalent for Linux - https://github.com/kunai-project/kunai
  • Logging Made Easy (LME) - CISA recently took over stewardship of the Logging Made Easy project that can be very helpful for organizations that do not have the kind of budget needed for a full-fledged SIEM - https://github.com/cisagov/LME
  • SELKS - a free and open source Debian-based IDS/IPS/Network Security Monitoring platform - https://github.com/StamusNetworks/SELKS
  • Sigma - if you understand what an intrusion detection system (IDS) does then you’ll appreciate Sigma that enables threat-signatures based on logging data - https://github.com/SigmaHQ/sigma
  • Wazah - Open source XDR and SIEM protection for endpoints and cloud workloads - https://github.com/wazuh/wazuh

Ransomware Response

Threat Response and Threat Management

Vulnerability and Discovery

Platforms and Systems

  • Authentik - an open-source Identity Provider (IdP) that can integrated into existing environments to support new protocols, and is an awesome solution for implementing sign-up, recovery, into your application - https://github.com/goauthentik/authentik
  • Kali Linux - you really should already know about Kali. The cool kids use Kali Linux for good reason, it’s an open-sourced OS with a wide range of security tools already installed and ready to use. The final release for 2023 just dropped, get it while it’s hot - https://www.kali.org/get-kali

Information and Further Learning

Cybersecurity Awesome lists