My cybersecurity toolkit
Overview
Ever since I started my journey into the world of cybersecurity, I’ve been compiling a list of resources and tools. It’s my way of keeping track of everything I’m learning and organizing it in a way that makes sense to me. Think of it as my personal cybersecurity knowledge base.
The core principle I use is categorization by team and purpose. This means I first group tools and resources based on who primarily uses them (Red Team, Blue Team, or other security functions) and then, within those groups, I further organize them by what they are used for (vulnerability scanning, incident response, etc.).
This will be updated over time as I find new resources and tools.
List
Red Team (Offensive)
Vulnerability Discovery
Identifying weaknesses in systems, networks, and applications.
Penetration Testing
Simulating real-world attacks to exploit vulnerabilities and gain unauthorized access.
Social Engineering
Manipulating individuals into divulging sensitive information or performing actions that compromise security.
Wireless Security Testing
Assessing the security of wireless networks.
Web Application Security
Specifically focusing on vulnerabilities in web applications.
gobuster
: Directory and file brute-forcing tool.
Network Security Testing
Evaluating the security of network infrastructure.
Nmap
: Powerful and versatile network scanner.
Reconnaissance/Information Gathering
theHarvester
: Email and username gathering tool.hunter.io
: Email address finding service.Enum4Linux
: Tool for enumerating information from Windows and Samba systems.
Exploit Development
Creating and customizing payloads for penetration testing and exploit development.
msfvenom
: Command-line payload generator for the Metasploit Framework.
Password Cracking
Attempting to recover passwords by trying various combinations of characters.
Hydra
: Password cracking tool supporting various services.
Physical Security Testing
Assessing the security of physical access controls and infrastructure.
Red Teaming Exercises/Simulated Attacks
Conducting full-scale simulations to test an organization’s defenses.*
Post-Exploitation
Simulating actions an attacker might take after gaining access (e.g., data exfiltration, privilege escalation, persistence).
Bypass Detection
Developing and testing techniques to evade security defenses.
Blue Team (Defensive)
Security Monitoring and Threat Detection
Continuously monitoring systems and networks for suspicious activity.
Wazuh
: Open-source SIEM and EDR system.Sysmon
: Windows system service that logs detailed system events.
Incident Response
Responding to security incidents to contain them, mitigate damage, and restore systems.
Velociraptor
: Advanced endpoint monitoring, digital forensics, and incident response tool.
Vulnerability Management
Identifying and remediating vulnerabilities.
Nessus (Tenable)
: Vulnerability scanner.
Security Hardening
Implementing security controls to reduce the attack surface.
Threat Intelligence
Gathering and analyzing information about potential threats.
Ransomware-Tool-Matrix
: A curated list of tools used by different ransomware and extortionist groups.maltrail
: A malicious traffic detection system that uses public and custom blacklists to identify threats.
Security Awareness Training
Educating employees about security best practices.
Log Management and Analysis
Collecting and analyzing security logs.
Security Auditing
Assessing security controls and configurations.
Endpoint Security
Protecting endpoint devices.
ClamAV
: Open-source antivirus engine.
Network Security
Protecting network infrastructure.
maltrail
: A malicious traffic detection system that uses public and custom blacklists to identify threats.
Intrusion Detection and Prevention
Monitoring systems and networks for malicious activity and taking action to block or mitigate threats.
CrowdSec
: Open-source collaborative intrusion detection and prevention system.
Web Application Security
Protecting web applications from various attacks and vulnerabilities.
BunkerWeb
: Open-source self-hosted & cloud web application firewall.SafeLine
: Open-source self-hosted web application firewall.
Email Security
Tools and resources related to securing email communication and preventing email-based attacks.
DMARC-SPF-Checker
: A tool to check the DMARC and SPF records of a domain.MX Toolbox
: Website providing diagnostic tools for email servers.
Data Security
Protecting sensitive data.
Identity and Access Management (IAM)
Managing user identities and access privileges.
Endpoint Visibility
Collecting and analyzing system data to detect suspicious activity, ensure compliance, and improve security posture. This includes tools for querying system state, logging events, and auditing configurations.
osquery
: Tool for querying system information using SQL.
Privileged Access Management (PAM)
Managing and controlling access to privileged accounts and sensitive systems.
JumpServer
: Open-source bastion host/PAM system.
Cloud Security Posture Management (CSPM)
Assessing and improving the security posture of cloud environments.
Push Security
: Cloud security posture management tool.
Security Architecture and Design
Designing and implementing secure systems.
Policy and Compliance
Developing and enforcing security policies.
Malware Analysis
Analyzing malware samples to understand their functionality, identify their characteristics, and develop detection methods.
YARA
: Tool for identifying and classifying malware based on rules.VirusTotal
: Website for analyzing files and URLs for malware.
Other Security Functions
DevSecOps (Development Security Operations)
Integrating security into the software development lifecycle (SDLC).
GRC (Governance, Risk, and Compliance)
Managing security risk and ensuring compliance.
Eramba
: Open-source GRC platform.
Security Engineering/Architecture
Designing, building, and maintaining secure systems. (Broader, encompassing both proactive and reactive aspects.)
Digital Forensics and Incident Response (DFIR)
Investigating security incidents and gathering evidence.
Chainsaw
: Memory forensics tool for incident response and malware analysis.FTK Imager
: Tool for creating forensic images of disks and other media.gkape
: Open-source incident response and forensics tool for memory and disk analysis.WinPmem
: Library for accessing physical memory in Windows, used for memory analysis and forensics.Volatility 3
: Open-source memory forensics framework for extracting and analyzing information from volatile memory (RAM).LiME
: Loadable Kernel Module (LKM) that captures the contents of volatile memory (RAM) for later analysis.
Threat Intelligence Analysis
Collecting, analyzing, and disseminating threat information. (Distinct from Blue Team’s which is often performed by dedicated analysts.)
Security Operations Center (SOC) Operations
The day-to-day running of the SOC, including monitoring, incident response, and threat hunting.
Vulnerability Research
Discovering new vulnerabilities.
Security Management
Overseeing all aspects of an organization’s security program. (This is a management function, not a technical one.)
OSINT (Open Source Intelligence)
Gathering and analyzing publicly available information to gain insights about targets, threats, or vulnerabilities.
OSINT Framework
: A comprehensive collection of OSINT tools and techniques.Have I Been Pwned
: A website that allows users to check if their personal data has been compromised in data breaches.onion-lookup
: Software for checking the existence of Tor hidden services and retrieving their metadata.DomainTools
: Website providing information about domain names and IP addresses.URLScan.io
: Website for scanning and analyzing URLs.
Data Analysis & Manipulation Tools
Versatile tools for manipulating and analyzing data in various security contexts.
CyberChef
: Web-based application for data manipulation and analysis.
Windows System Utilities
-
sc.exe
- Service Control utility for managing Windows services- Red Team Uses: Creating or modifying services for persistence, privilege escalation, or lateral movement. Disabling services to disrupt defenses.
- Blue Team Uses: Auditing service configurations, hardening service permissions, troubleshooting service-related issues, stopping malicious services during incident response.
-
reg
- Registry Editor for viewing and modifying the Windows Registry- Red Team Uses: Modifying registry keys for persistence, information gathering, bypassing security controls, or executing payloads.
- Blue Team Uses: Auditing registry settings for security vulnerabilities, implementing security hardening configurations, investigating malware activity, analyzing system configurations.
-
ping
- Basic network connectivity testing- Red Team Uses: Reconnaissance (checking if hosts are up), network mapping.
- Blue Team Uses: Troubleshooting network connectivity issues, verifying network configurations.
-
traceroute
- Traces the route packets take to reach a destination- Red Team Uses: Network mapping, identifying network infrastructure.
- Blue Team Uses: Troubleshooting network latency issues, analyzing network paths.
-
dig
- Domain Information Groper for DNS lookups- Red Team Uses: Reconnaissance (gathering information about a target’s DNS records, identifying subdomains).
- Blue Team Uses: Troubleshooting DNS resolution issues, verifying DNS configurations.
Sysinternals
A suite of powerful tools for managing, troubleshooting, and monitoring Windows systems.
-
TCPView
- Displays detailed listings of TCP and UDP endpoints- Red Team Uses: Identifying open ports and services, understanding network connections established by applications, finding potential attack vectors.
- Blue Team Uses: Troubleshooting network connectivity issues, identifying malicious network connections, monitoring network activity, investigating malware communication.
-
Process Explorer
- Advanced process monitoring tool- Red Team Uses: Analyzing running processes, identifying potential targets for attack, understanding process relationships, finding vulnerabilities in running applications.
- Blue Team Uses: Troubleshooting performance issues, identifying malicious processes, investigating malware activity, analyzing system behavior.