Penetration testing commands for Defensive

Defensive security aims to protect information systems from attacks through detection, prevention, and response measures. This section provides resources for strengthening the security posture against potential threats.

NameDescriptionPrice
AnoMarkStatistical learning algorithm to create a model on the command lines of the Process Creation events on Windows, in order to detect anomalies in future eventsFree
BlueHoundHelps blue teams pinpoint the security issues that actually matter by combining information about user permissions, network access and unpatched vulnerabilities, to reveal the paths attackers would take if they were inside the networkFree
DARKSURGEONWindows project to empower incident response, digital forensics, malware analysis, and network defense with HashiCorp Packer and VagrantFree
DemingManagement tool for the information security management system (ISMS); manage, plan, track and report the effectiveness of security controlsFree
driftctlMeasures infrastructure as code coverage, and tracks infrastructure driftFree
FalconHoundPlug BloodHound with a SIEM or other log aggregationFree
GraphQL ArmorGraphQL security layer for Apollo and Yoga / Envelop serversFree
Have I Been Squatted? - TwistrGenerate all permutations of a domain which are enriched for typosquatting detectionFree
Imagemagick Security Policy EvaluatorAllows developers and security experts to check if an Imagemagick XML Security Policy is hardened against a wide set of malicious attacksFree
libirisCross-platform sandboxing libraryFree
MercatorWeb application to manage the mapping of an information system as described in the Mapping The Information System Guide of the ANSSIFree
PandoraAnalysis framework that discovers if a file is suspicious and conveniently show the resultsFree
Pandora-boxDetect and remove malware from USB disks (based on Pandora)Free
SantaBinary authorization system for macOSFree
usbsasTool and framework for securely reading untrusted USB mass storage devicesFree
WazuhSecurity monitoring solution for threat detection, integrity monitoring, incident response and compliance; unified XDR and SIEM protection for endpoints and cloud workloadsFree
WHIDSEDR for WindowsFree