All Projects → InfosecHouse → InfosecHouse

InfosecHouse / InfosecHouse

Licence: other
Infosec resource center for offensive and defensive security operations.

Projects that are alternatives of or similar to InfosecHouse

evtx-hunter
evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
Stars: ✭ 122 (+100%)
Mutual labels:  incident-response, infosec
WireBirb
A scapy based module for programming offensive and defensive networking tools easier than before.
Stars: ✭ 16 (-73.77%)
Mutual labels:  offensive-security, defensive-security
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+1165.57%)
Mutual labels:  infosec, offensive-security
Hackthebox
Notes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 167 (+173.77%)
Mutual labels:  tools, infosec
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (+372.13%)
Mutual labels:  incident-response, infosec
Awesome Recruitment
List of my favourite recruitment things 💫
Stars: ✭ 226 (+270.49%)
Mutual labels:  tools, resources
SuperLibrary
Information Security Library
Stars: ✭ 60 (-1.64%)
Mutual labels:  infosec, offensive-security
Infosec Badges
Badges for your GitHub tool presented at InfoSec Conference
Stars: ✭ 74 (+21.31%)
Mutual labels:  tools, infosec
oscp-omnibus
A collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-24.59%)
Mutual labels:  infosec, offensive-security
training-materials
No description or website provided.
Stars: ✭ 47 (-22.95%)
Mutual labels:  incident-response, infosec
Slack Watchman
Monitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (+160.66%)
Mutual labels:  tools, infosec
LGM-SOC-21
This repo belongs to LGM-SOC'21 and contains important links to refer , in case participants want a one stop resource to learn a framework , language or anything
Stars: ✭ 38 (-37.7%)
Mutual labels:  tools, resources
Gitlab Watchman
Monitoring GitLab for sensitive data shared publicly
Stars: ✭ 127 (+108.2%)
Mutual labels:  tools, infosec
Awesome Gbdev
Contribute
Stars: ✭ 3,016 (+4844.26%)
Mutual labels:  tools, resources
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (+72.13%)
Mutual labels:  tools, infosec
Some Pentesters SecurityResearchers RedTeamers
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Stars: ✭ 60 (-1.64%)
Mutual labels:  offensive-security, defensive-security
Pockint
A portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
Stars: ✭ 196 (+221.31%)
Mutual labels:  incident-response, infosec
Ios
Most usable tools for iOS penetration testing
Stars: ✭ 563 (+822.95%)
Mutual labels:  tools, infosec
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+370.49%)
Mutual labels:  infosec, pentest-tools
awesome-bookmarks
书签「利器」收集 🍪🍿 Wiki 在线阅读👉
Stars: ✭ 45 (-26.23%)
Mutual labels:  tools, resources

Introduction





An @0xPGP Project

Infosec resource center for offensive and defensive security operations.


A curated list of many tools and resources for both offensive and defensive security teams. Please visit https://infosec.house/ for our website version of this repo. Found a resources that should be on here? Feel free to submit a pull request!

Defensive Security

asset-count

Sub-Category Description
Asset Management Keep track of your inventory. You can't protect what you don't see.
Auditing Stay in compliance.
Courses Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase.
Endpoint Protection Protect your endpoints.
Forensics Uncover the dirty little secrets of a recovered HDD, Image, malware, and more.
Honeypots Catch them with their hands/attacks sticky.
IDS/IPS Intrusion Detection and Prevention Systems.
Incident Response Incident response tools, and resources when alarms pop off.
IOC Indicators of compromise. Discover if you've been compromised.
Malware All the malware you can wish for to reverse engineer.
Monitoring Monitor your network, e-mail, packets, and infrastructure.
Operating Systems Operating system's solely focused for defensive security teams.
Phishing Tools and resources for analyzing phishing attacks.
Threat Intel Discover where the threats begin.

Offensive Security

asset-count

Sub-Category Description
API Tools and resources for pentesting against API endpoints.
Blogs Reading material for offensive security researchers.
Bug Bounty Test out your skills against other hackers. Get paid for finding vulnerabilities.
C2 Command and Control tools and frameworks.
Cheat Sheets Offensive security cheat sheets.
Cloud Discover tools and resources dedicated to hacking cloud platforms.
Collaboration Discover tools and frameworks for red team collaboration.
Courses Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase.
Cracking Everything you need to crack all the hashes.
CTF Offensive Compete your hacking skills against others.
Data Exfiltration Exfiltrate the data, and test your DLP.
Exploits Gather all your exploits needed to pop that box.
Firewalls Attack the castle doors.
Hardware Grab some of the most used hardware within the penetration testing industry.
Linux Tools and resources for popping those linux boxes.
Mobile Tools and resources for pentesting on mobile applications.
Network Sniff the network. Modify the packets.
Operating Systems Operating system's solely focused for offensive security teams.
Reconnaissance Understand your target. Perform in-depth research and discover new attack surfaces.
Shells Generating pre-built webshells to customizing your own.
Social Engineering Manipulation techniques that exploits human error to gain private information, access, or valuables.
Vulnerability Scanners Discover vulnerabilities fast, and automate some of the heavy loads.
Web Application Break that web application.
Windows Mirosoft Windows pentesting tools and resources.
Wireless Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more.

Operation Security

asset-count

Sub-Category Description
Anonymity The quality or state of being anonymous. Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance.
Anti-Forensics Destroy your data.
Authentication Secure your authentication methods with 2-Factor Authentication.
Burners Everything for your temporary needs.
Communication Protect your SMS messages, voice calls, and e-mails. Big brother is always watching.
Operating Systems Hardening your operating system.
Password/Secret Managers Secure your passwords, secrets, and notes.
Search Engines Hardening your operating system.

Purple Security

asset-count

Sub-Category Description
Courses Training and courses to master your craft.
Editors & Viewers Tools for editing/viewing files.
Emulation Emulate the adversary.
Network Network tools both offensive and defensive operations can utilize.
OSINT Open-Source Intel. Get all the information needed for your target.
Passwords 1,000+ default passwords.
Reverse Engineering Reverse engineering tools both offensive and defensive operations can utilize.
Write-Ups Write-ups both offensive and defensive operataions can utilize.

Xtras

asset-count

Sub-Category Description
Music Kick back relax and enjoy some entertainment.
Video Talks, livestreams, and presentations.

Contributors


Shoutout to the following amazing individuals for suggesting and adding resources!

Anonymous, 0xgnnr, 0xrom, Binary.rip, CyberLola, DevNullZen, EightBitOni, GoProSlowYo, JR0ch17, projectdp, PaWNmUnCher, RySkill, Vander_Grift, chadb_n00b, footpics4sale, goldyautomation, halfamomo, p4r4n0ir, skyfire100, theGwar, and zuphzuph.

Social Media


Organization Hyperlink
Discord https://discord.gg/FWe9bjDBfY
Instagram https://www.instagram.com/InfosecHouse/
Twitter https://twitter.com/InfosecHouse/
Telegram https://t.me/InfosecHouse/
Twitch https://www.twitch.tv/InfosecHouse/
YouTube https://www.youtube.com/channel/UC4PgsAu56TSpzH66aIOqbKQ/
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].