From c5293a12504366933621d2571309f7e6a5915016 Mon Sep 17 00:00:00 2001 From: nbats <44333466+nbats@users.noreply.github.com> Date: Sat, 25 May 2024 06:16:43 -0700 Subject: [PATCH] Update DEVTools.md --- DEVTools.md | 99 ++++++++++++++++++++++++++++------------------------- 1 file changed, 52 insertions(+), 47 deletions(-) diff --git a/DEVTools.md b/DEVTools.md index f302f6a30..16f1ef7d2 100644 --- a/DEVTools.md +++ b/DEVTools.md @@ -868,53 +868,6 @@ *** -## ▷ Cybersecurity Tools - -* 🌐 **[Awesome Cyber Security](https://github.com/fabionoth/awesome-cyber-security)**, [Awesome Security](https://github.com/sbilly/awesome-security), [Rawsec's CyberSecurity Inventory](https://inventory.raw.pm/), [Cybersecurity-Resources](https://github.com/Nickyie/Cybersecurity-Resources), [Infosec Resources](https://github.com/stong/infosec-resources) or [Anon Security](https://t.me/anon_server) - Cybersecurity Resources -* 🌐 **[Awesome CI/CD Security](https://github.com/myugan/awesome-cicd-security)** - CI/CD Security Resources -* 🌐 **[Awesome Cryptography](https://github.com/sobolevn/awesome-cryptography)** - Cryptography Resources -* 🌐 **[Reverse Engineering Resources](https://github.com/wtsxDev/reverse-engineering)** - Reverse Engineering Resources -* ↪️ **[Pentesting Resources](https://www.reddit.com/r/FREEMEDIAHECKYEAH/wiki/storage#wiki_pentesting_resources)** -* ⭐ **[x64dbg](https://x64dbg.com/)** - Malware Reverse Engineering -* ⭐ **[RevShells](https://www.revshells.com/)** - Reverse Shell Generator -* [Open Source Security Software](https://open-source-security-software.net/) - Cybersecurity Software -* [Advisory Database](https://github.com/github/advisory-database), [ThreatFox](https://threatfox.abuse.ch/) or [Att&ck](https://attack.mitre.org/) - Cybersecurity Defense Databases -* [SSuite](https://spidersuite.github.io/SSuite/) - Web Security App -* [osquery](https://osquery.io) or [Nmap](https://nmap.org/) - Security Monitors -* [Canarytokens](https://canarytokens.org/generate) - Network Breach Check -* [Nuclei](https://docs.projectdiscovery.io/tools/nuclei) / [GitHub](https://github.com/projectdiscovery/nuclei) or [NVD](https://nvd.nist.gov/) - Vulnerability Tracking / Scanning -* [Zeek](https://zeek.org/), [Nmap](https://nmap.org/) / [Results](https://nmap.org/ndiff/), [Kismet](https://www.kismetwireless.net/), [ntop](https://www.ntop.org/) or [Sniffnet](https://www.sniffnet.net/) - Network Monitors -* [Crowdsec](https://crowdsec.net/) - Crowd-Sourced Intrusion Detection / Prevention / [GitHub](https://github.com/crowdsecurity/crowdsec) -* [X-Force Exchange](https://exchange.xforce.ibmcloud.com/) - Security Threat Intelligence Platform -* [ThreatMap](https://threatmap.checkpoint.com/) or [CyberMap](https://cybermap.kaspersky.com/) - Live Malware Distribution Maps -* [VirusShare](https://virusshare.com/), [PulseDive](https://pulsedive.com/) or [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - Malware Search -* [The Void](https://www.thevoid.community/) - Software Incident Reports -* [Fail2Ban](https://github.com/fail2ban/fail2ban) - Protect Servers from Brute Force Attacks -* [OpenSCA-CLI](https://github.com/XmirrorSecurity/OpenSCA-cli) - Composition Analysis for Third Party Components -* [Unblob](https://unblob.org/) - Extraction Suite -* [Security Onion Solutions](https://securityonionsolutions.com/), [Wazuh](https://wazuh.com/) or [Snyk](https://snyk.io/) / [GitHub](https://github.com/snyk/cli) - Site Security Monitor -* [Greenbone](https://github.com/greenbone) - Vulnerability Management -* [Evervault](https://evervault.com/) - Security / Compliance Infrastructure -* [HTTPToolkit](https://httptoolkit.com/) - Debug, Test & Build with HTTP(S) -* [IP Intelligence](https://getipintel.net/), [AbuseIPDB](https://www.abuseipdb.com/ ) or [Proxy Check](https://proxycheck.io/) - Proxy / VPN / Bad IP Detection -* [DarkVisitors](https://darkvisitors.com/) - Autonomous Chatbots / Data Scraper List -* [Al-Khaser](https://github.com/LordNoteworthy/al-khaser) - Anti-Malware Stress Test -* [YARA](https://virustotal.github.io/yara/) - Malware Identification Tool -* [Winitor](https://www.winitor.com/) - EXE Malware Assessment -* [HTTPLeaks](https://github.com/cure53/HTTPLeaks) - HTTP Sites Leak Information -* [Cryptography](https://pub.dev/packages/cryptography) - Dart and Flutter Cryptography Library -* [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://cutter.re/) - Reverse Engineering -* [Flare VM](https://github.com/mandiant/flare-vm) - Reverse Engineering Environment Setup Script -* [MSTG](https://mas.owasp.org/) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering -* [challenges.re](https://challenges.re/) - Reverse Engineer Code -* [CVE Details](https://www.cvedetails.com/) - CVE Details -* [ImHex](https://imhex.werwolv.net) - Hex Editor / [Web Version](https://web.imhex.werwolv.net/) -* [YASNAC](https://github.com/RikkaW/YASNAC) - SafetyNet Attestation Checker -* [AllSafe](https://github.com/t0thkr1s/allsafe) - Intentionally Vulnerable Android App -* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer - -*** - ## ▷ Database Tools * 🌐 **[DB Engines](https://db-engines.com/en/ranking)** - Database Rankings @@ -1465,3 +1418,55 @@ * [minitorch](https://github.com/minitorch/minitorch) - Machine Learning Engineering Course Code * [ML-Youtube-Courses](https://github.com/dair-ai/ML-YouTube-Courses) - Machine Learning Courses on YouTube * [Cyberbotics](https://cyberbotics.com/) - Robot Simulator + +*** + +# ► Cybersecurity Tools + +* 🌐 **[Awesome Cyber Security](https://github.com/fabionoth/awesome-cyber-security)**, [Awesome Security](https://github.com/sbilly/awesome-security), [Rawsec's CyberSecurity Inventory](https://inventory.raw.pm/), [Cybersecurity-Resources](https://github.com/Nickyie/Cybersecurity-Resources), [Infosec Resources](https://github.com/stong/infosec-resources) or [Anon Security](https://t.me/anon_server) - Cybersecurity Resources +* 🌐 **[Awesome CI/CD Security](https://github.com/myugan/awesome-cicd-security)** - CI/CD Security Resources +* 🌐 **[Awesome Cryptography](https://github.com/sobolevn/awesome-cryptography)** - Cryptography Resources +* [Open Source Security Software](https://open-source-security-software.net/) - Cybersecurity Software +* [Advisory Database](https://github.com/github/advisory-database), [ThreatFox](https://threatfox.abuse.ch/) or [Att&ck](https://attack.mitre.org/) - Cybersecurity Defense Databases +* [SSuite](https://spidersuite.github.io/SSuite/) - Web Security App +* [osquery](https://osquery.io) or [Nmap](https://nmap.org/) - Security Monitors +* [Canarytokens](https://canarytokens.org/generate) - Network Breach Check +* [Nuclei](https://docs.projectdiscovery.io/tools/nuclei) / [GitHub](https://github.com/projectdiscovery/nuclei) or [NVD](https://nvd.nist.gov/) - Vulnerability Tracking / Scanning +* [Zeek](https://zeek.org/), [Nmap](https://nmap.org/) / [Results](https://nmap.org/ndiff/), [Kismet](https://www.kismetwireless.net/), [ntop](https://www.ntop.org/) or [Sniffnet](https://www.sniffnet.net/) - Network Monitors +* [Crowdsec](https://crowdsec.net/) - Crowd-Sourced Intrusion Detection / Prevention / [GitHub](https://github.com/crowdsecurity/crowdsec) +* [X-Force Exchange](https://exchange.xforce.ibmcloud.com/) - Security Threat Intelligence Platform +* [ThreatMap](https://threatmap.checkpoint.com/) or [CyberMap](https://cybermap.kaspersky.com/) - Live Malware Distribution Maps +* [VirusShare](https://virusshare.com/), [PulseDive](https://pulsedive.com/) or [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - Malware Search +* [The Void](https://www.thevoid.community/) - Software Incident Reports +* [Fail2Ban](https://github.com/fail2ban/fail2ban) - Protect Servers from Brute Force Attacks +* [OpenSCA-CLI](https://github.com/XmirrorSecurity/OpenSCA-cli) - Composition Analysis for Third Party Components +* [Unblob](https://unblob.org/) - Extraction Suite +* [Security Onion Solutions](https://securityonionsolutions.com/), [Wazuh](https://wazuh.com/) or [Snyk](https://snyk.io/) / [GitHub](https://github.com/snyk/cli) - Site Security Monitor +* [Greenbone](https://github.com/greenbone) - Vulnerability Management +* [Evervault](https://evervault.com/) - Security / Compliance Infrastructure +* [HTTPToolkit](https://httptoolkit.com/) - Debug, Test & Build with HTTP(S) +* [IP Intelligence](https://getipintel.net/), [AbuseIPDB](https://www.abuseipdb.com/ ) or [Proxy Check](https://proxycheck.io/) - Proxy / VPN / Bad IP Detection +* [DarkVisitors](https://darkvisitors.com/) - Autonomous Chatbots / Data Scraper List +* [Al-Khaser](https://github.com/LordNoteworthy/al-khaser) - Anti-Malware Stress Test +* [YARA](https://virustotal.github.io/yara/) - Malware Identification Tool +* [Winitor](https://www.winitor.com/) - EXE Malware Assessment +* [HTTPLeaks](https://github.com/cure53/HTTPLeaks) - HTTP Sites Leak Information +* [Cryptography](https://pub.dev/packages/cryptography) - Dart and Flutter Cryptography Library +* [CVE Details](https://www.cvedetails.com/) - CVE Details +* [ImHex](https://imhex.werwolv.net) - Hex Editor / [Web Version](https://web.imhex.werwolv.net/) +* [YASNAC](https://github.com/RikkaW/YASNAC) - SafetyNet Attestation Checker +* [AllSafe](https://github.com/t0thkr1s/allsafe) - Intentionally Vulnerable Android App +* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer + +*** + +## ▷ Reverse Engineering + +* 🌐 **[Reverse Engineering Resources](https://github.com/wtsxDev/reverse-engineering)** - Reverse Engineering Resources +* ↪️ **[Pentesting Resources](https://www.reddit.com/r/FREEMEDIAHECKYEAH/wiki/storage#wiki_pentesting_resources)** +* ⭐ **[x64dbg](https://x64dbg.com/)** - Debugger for Reverse Engineering +* ⭐ **[RevShells](https://www.revshells.com/)** - Reverse Shell Generator +* [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://cutter.re/) - Reverse Engineering +* [Flare VM](https://github.com/mandiant/flare-vm) - Reverse Engineering Environment Setup Script +* [MSTG](https://mas.owasp.org/) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering +* [challenges.re](https://challenges.re/) - Reverse Engineer Code