# Home

Tools & Resources for Cyber Security Operations

Enhance your cyber security operations with a comprehensive range of tools and resources for both offensive and defensive strategies.

Please visit https://infosec.house for our website version of this repo.

Found a resources that should be on here? Feel free to submit a Pull Request! Need to report a broken/incorrect link? Feel free to submit an Issue.

# Defensive Security

  • Asset Management - Keep track of your inventory. You can't protect what you don't see.
  • Auditing - Stay in compliance.
  • Courses - Training and courses to master your craft.
  • Endpoint Protection - Protect your endpoints.
  • Forensics - Uncover the dirty little secrets of a recovered HDD, Image, malware, and more.
  • Honeypots - Catch them with their hands/attacks sticky.
  • IDS/IPS - Intrusion Detection and Prevention Systems.
  • Incident Response - Incident response tools, and resources when alarms pop off.
  • IOC - Indicators of compromise. Discover if you've been compromised.
  • Malware - All the malware you can wish for to reverse engineer.
  • Monitoring - Monitor your network, e-mail, packets, and infrastructure.
  • Operating Systems - Operating system's solely focused for defensive security teams.
  • Phishing - Tools and resources for analyzing phishing attacks.
  • Threat Intel - Discover where the threats begin.

# Offensive Security

  • API - Tools and resources for pentesting against API endpoints.
  • Blogs - Reading material for offensive security researchers.
  • Bug Bounty - Test out your skills against other hackers. Get paid for finding vulnerabilities.
  • Command & Control - Command and Control tools and frameworks.
  • Cheat Sheets - Offensive security cheat sheets.
  • Cloud - Discover tools and resources dedicated to hacking cloud platforms.
  • Collaboration - Discover tools and frameworks for red team collaboration.
  • Courses - Training and courses to master your craft.
  • Cracking - Everything you need to crack all the hashes.
  • Cryptography - How great is your cryptography.
  • CTF Offensive - Compete your hacking skills against others.
  • Data Exfiltration - Exfiltrate the data, and test your DLP.
  • E-Mail - E-Mail pentesting tools and resources.
  • Evasion - Evade getting caught.
  • Exploits - Gather all your exploits needed to pop that box.
  • Firewalls - Attack the castle doors.
  • Hardware - Grab some of the most used hardware within the penetration testing industry.
  • Linux - Tools and resources for popping those linux boxes.
  • Mobile - Tools and resources for pentesting on mobile applications.
  • Network - Sniff the network. Modify the packets.
  • Operating Systems - Operating system's solely focused for offensive security teams.
  • Reconnaissance - Understand your target. Perform in-depth research and discover new attack surfaces.
  • Shells - Generating pre-built webshells to customizing your own.
  • Social Engineering - Manipulation techniques that exploits human error to gain private formation, access, or valuables.
  • Vulnerability Scanners - Discover vulnerabilities fast, and automate some of the heavy loads.
  • Web Application - Break that web application.
  • Windows - Mirosoft Windows pentesting tools and resources.
  • Wireless - Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more.

# Operation Security

  • Anonymity - The quality or state of being anonymous. Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance.
  • Anti-Forensics - Destroy your data.
  • Burners - Everything for your temporary needs.
  • Communication - Protect your SMS messages, voice calls, and e-mails. Big brother is always watching.
  • Operating Systems - Hardening your operating system.
  • Passwords & Authentication - Secure your passwords, secrets, and notes.
  • Search Engines - Hardening your operating system.

# Purple Security

  • Analysis - Tools and scripts for analyzing data.
  • Courses - Training and courses to master your craft.
  • Editors & Viewers - Tools for editing/viewing files.
  • Emulation - Emulate the adversary.
  • Network - Network tools both offensive and defensive operations can utilize.
  • OSINT - Open-Source Intel. Get all the information needed for your target.
  • Passwords - 1,000+ default passwords.
  • Reverse Engineering - Reverse engineering tools both offensive and defensive operations can utilize.
  • Write-Ups - Write-ups both offensive and defensive operataions can utilize.

# Entertainment

  • Music - Kick back relax and enjoy some entertainment.
  • Video - Talks, livestreams, and presentations.