Skip to main content

Podcasts

  • Podcast - https://darknetdiaries.com/ - CyberSecurity related podcast, from Ethical Hacking, to interviews of people who have perpetrated Cyber Crime. NOTE: He will announce at the beginning of the podcast if there is foul language or potentially sensitive topics. 
  • Podcast - https://thecyberwire.com/ - Daily podcast

 

Blogs

 

Training / Webinars / Organizations

 

Career

 

Reading

 

Forensics Tools

 

Curated Lists of tools:

 

Artifacts

  • ForensicArtifacts - https://github.com/ForensicArtifacts/artifacts - A free, community-sourced, machine-readable knowledge base of digital forensic artifacts that the world can use both as an information source and within other tools.

 

LINUX Distributions

  • KALI - https://www.kali.org/
  • Paladin - https://sumuri.com/software/paladin/ - PALADIN Forensic is a modified “live” Linux distribution based on Ubuntu that simplifies various forensics tasks in a forensically sound manner via the PALADIN Toolbox. PALADIN is available in 64-bit and 32-bit versions.
  • SIFT Workstation - https://www.sans.org/tools/sift-workstation/ - The SIFT Workstation is a collection of free and open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings. It can match any current incident response and forensic tool suite. SIFT demonstrates that advanced incident response capabilities and deep-dive digital forensic techniques can be accomplished using cutting-edge open-source tools that are freely available and frequently updated.
  • Parrot Security - https://parrotsec.org/ - Parrot Security provides a huge arsenal of tools, utilities and libraries that IT and security professionals can use to test and assess the security of their assets in a reliable, compliant and reproducible way.
  • Tsurugi Linux - https://tsurugi-linux.org/ - a DFIR open source project that is and will be totally free, independent, without involving any commercial brand
  • CAINE - https://www.caine-live.net/ - CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface.
  • Flare VM - https://github.com/mandiant/flare-vm - Welcome to FLARE-VM - a collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a virtual machine (VM). 
  • CSI LINUX - https://hackernoon.com/csi-linux-linux-distribution-for-cyber-and-osint-investigationhttp://downloads.csilinux.com/
  • REMnux - https://remnux.org/ - REMnux® is a Linux toolkit for reverse-engineering and analyzing malicious software. REMnux provides a curated collection of free tools created by the community. Analysts can use it to investigate malware without having to find, install, and configure the tools.

 

Forensic Challenges / Samples

 

Incident Response

 

EDR / Endpoint Visibility Tools

 

Red Team / Penetration Testing

  • Infection Monkey - https://github.com/guardicore/monkey - Infection Monkey is an open-source adversary emulation platform that helps you improve your security posture using empirical data.
  • Atomic Red Team - https://atomicredteam.io/  - Atomic Red Team is an open-source library of tests that security teams can use to simulate adversarial activity in their environments.

 

Sandboxes / Malware analysis

  • DRAKVUF Sandbox - https://github.com/CERT-Polska/drakvuf-sandbox/ an automated black-box malware analysis system with DRAKVUF engine under the hood, which does not require an agent on guest OS.
  • CAPE - https://github.com/kevoreilly/CAPEv2 - A sandbox is used to execute malicious files in an isolated environment whilst instrumenting their dynamic behaviour and collecting forensic artefacts.
  • Panda.re - https://panda-re.mit.edu/ - PANDA is an open-source Platform for Architecture-Neutral Dynamic Analysis. It is built upon the QEMU whole system emulator, and so analyses have access to all code executing in the guest and all data. PANDA adds the ability to record and replay executions, enabling iterative, deep, whole system analyses. PANDA can be controlled from the command line, through our Python package, or even a Jupyter notebook. 
  • Ghidra - https://ghidra-sre.org/ - A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission
  • Thorium - https://github.com/cisagov/thorium - A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.

Python Modules