Penetration testing commands for Defensive
Defensive security aims to protect information systems from attacks through detection, prevention, and response measures. This section provides resources for strengthening the security posture against potential threats.
Name | Description | Price |
---|---|---|
AnoMark | Statistical learning algorithm to create a model on the command lines of the Process Creation events on Windows, in order to detect anomalies in future events | Free |
BlueHound | Helps blue teams pinpoint the security issues that actually matter by combining information about user permissions, network access and unpatched vulnerabilities, to reveal the paths attackers would take if they were inside the network | Free |
DARKSURGEON | Windows project to empower incident response, digital forensics, malware analysis, and network defense with HashiCorp Packer and Vagrant | Free |
Deming | Management tool for the information security management system (ISMS); manage, plan, track and report the effectiveness of security controls | Free |
driftctl | Measures infrastructure as code coverage, and tracks infrastructure drift | Free |
FalconHound | Plug BloodHound with a SIEM or other log aggregation | Free |
GraphQL Armor | GraphQL security layer for Apollo and Yoga / Envelop servers | Free |
Have I Been Squatted? - Twistr | Generate all permutations of a domain which are enriched for typosquatting detection | Free |
Imagemagick Security Policy Evaluator | Allows developers and security experts to check if an Imagemagick XML Security Policy is hardened against a wide set of malicious attacks | Free |
libiris | Cross-platform sandboxing library | Free |
Mercator | Web application to manage the mapping of an information system as described in the Mapping The Information System Guide of the ANSSI | Free |
Pandora | Analysis framework that discovers if a file is suspicious and conveniently show the results | Free |
Pandora-box | Detect and remove malware from USB disks (based on Pandora) | Free |
Santa | Binary authorization system for macOS | Free |
usbsas | Tool and framework for securely reading untrusted USB mass storage devices | Free |
Wazuh | Security monitoring solution for threat detection, integrity monitoring, incident response and compliance; unified XDR and SIEM protection for endpoints and cloud workloads | Free |
WHIDS | EDR for Windows | Free |