├── BlackHat2015_Arsenal_Note.txt └── README.md /BlackHat2015_Arsenal_Note.txt: -------------------------------------------------------------------------------- 1 | # BlackHat 2015 Arsenal Note 2 | 3 | # By Categories 4 | ## Categories 5 | * Forensic Tool 6 | * Vulerable Application 7 | * Attack/PenTest Framework 8 | * Security Monitoring Tool 9 | * Plugin 10 | * Static Analysis Tool 11 | * Mobile Security Testing Tool/Framework 12 | * Pentest Collaboration & Reporting Framework 13 | * Honeypot 14 | * Other Tool 15 | 16 | # By Time 17 | ## 8/5/2015 Day One 18 | ### Day 1 Group 1 19 | * Osxcollector 20 | * Recommended 21 | * MAC OSX Forensics Tool by Yelp security 22 | * https://github.com/Yelp/osxcollector 23 | * Additional Detail 24 | 25 | * DVIA 26 | * Vulnerable iOS program 27 | * http://damnvulnerableiosapp.com/ 28 | 29 | * Bearded 30 | * Recommended 31 | * Open source Security/PenTest Automation platform 32 | * https://github.com/bearded-web/bearded 33 | 34 | * Shpinx 35 | * Recommended 36 | * Open source security monitoring tool 37 | * https://github.com/hiro4848/sphinx/ 38 | 39 | * Nsearch 40 | * help find script into the nse database 41 | * https://github.com/JKO/nsearch 42 | 43 | * MITMf 44 | * Recommended 45 | * One-stop-shop for Man-In-The-Middle and network attacks 46 | * https://github.com/byt3bl33d3r/MITMf 47 | 48 | * Triforce 49 | * TBD 50 | 51 | * FindSecurityBugs 52 | * Recommended 53 | * Java and Scala static scanning tool 54 | * https://github.com/h3xstream/find-sec-bugs 55 | 56 | * QARK 57 | * (Android Quick Android Review), Kit App Anlaysis Tool 58 | * By LinkedIn Engineers 59 | * Claimed to be opensourced but not active on GitHub yet. 60 | 61 | * SERPICO 62 | * Recommended 63 | * Reporting/Colaboration tool, similar to Dradis Framework 64 | * https://github.com/MooseDojo/SERPICO 65 | * By Rapid 7 researcher, good reporting engine 66 | 67 | ### Day 1 Group 2 68 | 69 | * Nishang (BlackHat Version) 70 | * PowerShell tool/framework for PenTesting 71 | * https://github.com/samratashok/nishang 72 | 73 | * SqlChop 74 | * SQL Injection detection tool 75 | * By Chinese CTF team Blue Lotus 76 | * Not open sourced 77 | 78 | * Rudra 79 | * Automated inspection of network capture files 80 | * https://github.com/7h3rAm 81 | * By researcher from Qualys 82 | 83 | * OWASP Distributed Web Honeypots Project 84 | * Recommended 85 | * https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project 86 | * By Ryan Barnett, Principle Security Research of Akamai, ModSecurity Project leader, https://twitter.com/ryancbarnett 87 | 88 | * CTF Tool 89 | * Recommended 90 | * Central repo of up-to-date security tools, easy install 91 | * https://github.com/zardus/ctf-tools 92 | * By former UCSB CTF team member, current member of "Shellhish" 93 | 94 | * Exploitpack 95 | * TBD 96 | * http://exploitpack.com/ 97 | 98 | * Dradis Framework 99 | * Recommended 100 | * extensible, cross-platform, open source collaboration framework for InfoSec teams 101 | * capable of importing from 15 popular tools 102 | * https://github.com/dradis/dradisframework 103 | 104 | * Breachgo 105 | * Maltego enhanced 106 | * https://www.youtube.com/watch?v=O-X5-1SB5uc 107 | * Not yet open-sourced 108 | 109 | * Intrigue 110 | * Recommended 111 | * AttackSurface discover(Recon) tool (combining DNS discovery, nmap, zmap, masscan result) 112 | * By Jonathan Cran, No.1 BugCrowd US employee, ex Pwnie Express CTO 113 | * http://intrigue.io/ 114 | * https://github.com/intrigueio/intrigue-core 115 | 116 | * ElastAlert 117 | * Recommended 118 | * Simple monitering/alerting framework using data in Elasticsearch 119 | * By Quentin Long, Yelp security engineer, SIEM expert 120 | 121 | ### Day 1 Group 3 122 | 123 | * WireEdit 124 | * WYSIWYG network packets editor. It allows editing packets at all stack layers in a simple point-and-click interface. 125 | * https://wireedit.com/ 126 | * Not open sourced but offers free license. 127 | 128 | * peepdf 129 | * Python tool to explore PDF files in order to find out if the file can be harmful or not. 130 | * http://eternal-todo.com/tools/peepdf-pdf-analysis-tool 131 | 132 | * CapTipper 133 | * Analyze HTTP malicious traffic from PCAP files 134 | * https://github.com/omriher/CapTipper 135 | 136 | * Openioc_Scan 137 | * forensic/malware analysis tools extending Volatility Framework 138 | * https://github.com/TakahiroHaruyama/openioc_scan 139 | 140 | * The Volatity Framework 141 | * open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples of Windows, Linux, Mac OS X, and Android systems. 142 | * https://github.com/volatilityfoundation/volatility 143 | 144 | * Burp-hash 145 | * Recommended 146 | * Burp plugin 147 | * Passively scan requests looking for hashed values. Looking for match values. Identify hash type too. 148 | * https://github.com/burp-hash/burp-hash 149 | 150 | * SAMLyze 151 | * SAML Security Analysis 152 | * Github Location not found, but similar post here: 153 | * http://blog.csnc.ch/author/rbischof/ 154 | 155 | * PixelCAPTCHA 156 | * TBD 157 | 158 | * CuckooDroid 159 | * Recommended 160 | * Automated malware analysis framework 161 | * https://github.com/idanr1986/cuckoo-droid 162 | 163 | Seclists 164 | * Recommended 165 | * It's a collection of multiple types of lists used during security assessments, collected in one place. 166 | * https://github.com/danielmiessler/SecLists 167 | 168 | Trend of Day One Arsenal 169 | Security Monitoring tools is migrating towards data warehouse monitoring (Splunk, Elastic Search, Kibana) 170 | 171 | ## 8/6/2015 Day Two 172 | ### Day 2 Group 1 173 | * Reissue Request Scripter 174 | * Recommended 175 | * Burp Plugin for generating python script to replay the request later on 176 | * https://github.com/h3xstream/http-script-generator 177 | 178 | * SimpleRisk 179 | * Recommended 180 | * Open Source Enterprise Risk management platform 181 | * http://www.simplerisk.org/ 182 | * https://github.com/simplerisk 183 | 184 | * WATOBO 185 | * efficient (semi-automated) web application security audit tool 186 | * free software 187 | * http://watobo.sourceforge.net/index.html 188 | 189 | * ChipWhisperer 190 | * Side channel power analysis tool (hardware) 191 | * https://www.assembla.com/spaces/chipwhisperer/wiki 192 | * https://github.com/newaetech/chipwhisperer 193 | 194 | * SpeedPhishing Framework (SPF) 195 | * Recommended 196 | * SPF is an open source simple email phishing tool/framework which can assist penetration testers in quickly deploying phishing exercises in minimal time. 197 | * https://github.com/tatanus/SPF 198 | * https://www.youtube.com/watch?v=wMPlO41lo80 199 | 200 | * D1C0M-X 201 | * Highly recommended 202 | * Medical device remote scan/exploit tool 203 | * By MICHAEL HUDSON, CEO OF INTROEXON 204 | 205 | * OWASP Broken Web Application VM V12 206 | * Recommended 207 | * A collection of vulnerable web applications for training 208 | * By Chuck Wills, Senior Technical Director with Mandiant (a FireEye Company) 209 | 210 | * SHINOBOT 211 | * A RAT simulator to evaluate an organization's ability to protect its networks from an advanced targeted attack 212 | * http://shinobot.com/top.php 213 | * .NET based freeware 214 | 215 | * Mana 216 | * Recommended 217 | * A Wi-Fi rogue access point toolkit whose purpose is getting as many clients connected, and getting as many credentials from their connections. 218 | * https://github.com/sensepost/mana 219 | * http://www.slideshare.net/sensepost/improvement-in-rogue-access-points-sensepost-defcon-22 220 | * https://youtu.be/i2-jReLBSVk 221 | 222 | 223 | * PEStudio 224 | * Recommended 225 | * PE assessment of a malware without even infecting a lab system or studying its code. 226 | * https://www.winitor.com/ 227 | 228 | ### Day 2 Group 2 229 | 230 | * TARDIS 231 | * Recommended 232 | * Tripwire Automated Reconnaissance and Deep Inspection System 233 | * ties together threat feed data such as STIX and vulnerability scan data and references log repositories for indicators of compromise(IoC) 234 | * Talk from the author: https://www.blackhat.com/us-15/briefings.html#my-bro-the-elk-obtaining-context-from-security-events 235 | * Need to understand STIX, compliance requirement, 236 | * About the code (lacks documentation) https://github.com/tripwire/tardis 237 | * About STIX: https://stix.mitre.org/ 238 | 239 | * Backdoor Factory(BDF) and BDFProxy 240 | * Recommended 241 | * open source framework for patching PE, ELF, and Mach-O binaries with payloads or shellcode. 242 | * Inject payload when victim downloads bianry executables! 243 | * Part of Kali-Linux, Veil-Evasion, BlackArch Linux, and MITMf. 244 | * https://github.com/secretsquirrel/the-backdoor-factory 245 | * https://github.com/secretsquirrel/BDFProxy 246 | 247 | * Digital Disease Tracking Tool 248 | * Recommended 249 | * Web-Based Tracking app is an alpha proof of concept visualization tool, inspired by epidemiology, for infection reason/time analysis 250 | * By Efrain Ortiz, director in the Market and Technology Innovation Group at Symantec Corporation 251 | * Currently only support Symantec Enterprise Antivirus 252 | 253 | * UTIP 254 | * UNSTRUCTURED THREAT INTELLIGENCE PROCESSING, automates phases of threat data extraction from unstructured sources, and maps extracted elements to the STIX standard. 255 | * Scrumblr and Sketchy (open-source provided by Netflix) to scrape advisories, the OpenNLP stack for natural language processing 256 | * By Elvis Hover, Accenture 257 | * NLP part not fully opensourced 258 | 259 | * Preeny 260 | * Binary analysis tool for interacting with binary 261 | * https://github.com/zardus/preeny 262 | * https://lolware.net/2015/04/28/nginx-fuzzing.html 263 | 264 | * Linux-Inject 265 | * Inject code into a Linux process, support x86, x86_64, and ARM. 266 | * By TYLER COLGAN from NCC GROUP 267 | * https://github.com/gaffe23/linux-inject 268 | 269 | * OWASP Dependecy Check 270 | * Recommended 271 | * Depencency checking tool, OWASP flagship project 272 | * https://www.owasp.org/index.php/OWASP_Dependency_Check 273 | * https://github.com/jeremylong/DependencyCheck 274 | 275 | * BTA 276 | * Recommended 277 | * open-source Active Directory security audit framework 278 | * https://bitbucket.org/iwseclabs/bta 279 | * By Joffrey Czarny, security researcher of Airbus Group Innovations (FR) 280 | 281 | * Noriben 282 | * Portable, Simple, Malware Analysis Sandbox 283 | * https://github.com/Rurik/Noriben 284 | * Slides at: http://www.slideshare.net/bbaskin/bh15-arsenal-noriben 285 | * By Brian Baskin, form RSA, http://www.ghettoforensics.com/ 286 | 287 | ### Day 2 Group 3 288 | 289 | * Chellam 290 | * Recommended 291 | * A Wi-Fi IDS/Firewall for Windows 292 | * https://www.youtube.com/watch?v=hHjkhwejmrw 293 | * By VIVEK RAMACHANDRAN, author of "Backtrack 5: Wireless Penetration Testing", founder of SecurityTube.net. http://www.vivekramachandran.com/ 294 | 295 | * LYNIS 296 | * Recommended 297 | * A Shell Script for Linux-like system security check/analysis 298 | * https://github.com/CISOfy/lynis/ 299 | 300 | * objective-sees OSX Security Tools 301 | * Highly Recommended 302 | * A Toolkit for OSX system security check/anlaysis 303 | * https://objective-see.com/products.html 304 | * By Patrick Wardle, Director of Research at Synack 305 | * BlackHat/Defcon talk at https://objective-see.com/blog.html 306 | 307 | * Kautilya 308 | * USB and other plug-in devide attack software 309 | * https://github.com/samratashok/Kautilya 310 | 311 | * Faraday 312 | * Integrated Penetration-Test Environment a multiuser Penetration test IDE. 313 | * https://github.com/infobyte/faraday 314 | * Supporting 40+ plugins https://github.com/infobyte/faraday/wiki/Plugin-List 315 | * Supporting different platforms: https://github.com/infobyte/faraday/wiki/Installation 316 | 317 | * ThreadFix 318 | * Recommended 319 | * a software vulnerability aggregation and management system 320 | * http://www.denimgroup.com/blog/denim_group/2015/07/secure-devops-threadfix.html 321 | * By Dan Cornell, CTO of Denim Group 322 | 323 | * Heybe 324 | * Recommended 325 | * A Pentesting Tool Kit 326 | * https://github.com/galkan 327 | * Detail regarding the author: http://www.galkan.net/ 328 | 329 | * Cuckoosploit 330 | * an environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox 331 | * https://github.com/davidoren/CuckooSploit 332 | * By David Oren from Checkpoint 333 | 334 | * Yard Stick One 335 | * A sub-1 GHz wireless transceiver controlled directly from your computer. 336 | * https://greatscottgadgets.com/yardstickone/ 337 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # BlackHat 2015 Arsenal Note 2 | 3 | # By Categories 4 | ## Categories 5 | * Forensic Tool 6 | * Vulerable Application 7 | * Attack/PenTest Framework 8 | * Security Monitoring Tool 9 | * Plugin 10 | * Static Analysis Tool 11 | * Mobile Security Testing Tool/Framework 12 | * Pentest Collaboration & Reporting Framework 13 | * Honeypot 14 | * Other Tool 15 | 16 | # By Time 17 | ## 8/5/2015 Day One 18 | ### Day 1 Group 1 19 | * Osxcollector 20 | * Recommended 21 | * MAC OSX Forensics Tool by Yelp security 22 | * https://github.com/Yelp/osxcollector 23 | * Additional Detail 24 | 25 | * DVIA 26 | * Vulnerable iOS program 27 | * http://damnvulnerableiosapp.com/ 28 | 29 | * Bearded 30 | * Recommended 31 | * Open source Security/PenTest Automation platform 32 | * https://github.com/bearded-web/bearded 33 | 34 | * Shpinx 35 | * Recommended 36 | * Open source security monitoring tool 37 | * https://github.com/hiro4848/sphinx/ 38 | 39 | * Nsearch 40 | * help find script into the nse database 41 | * https://github.com/JKO/nsearch 42 | 43 | * MITMf 44 | * Recommended 45 | * One-stop-shop for Man-In-The-Middle and network attacks 46 | * https://github.com/byt3bl33d3r/MITMf 47 | 48 | * Triforce 49 | * TBD 50 | 51 | * FindSecurityBugs 52 | * Recommended 53 | * Java and Scala static scanning tool 54 | * https://github.com/h3xstream/find-sec-bugs 55 | 56 | * QARK 57 | * (Android Quick Android Review), Kit App Anlaysis Tool 58 | * By LinkedIn Engineers 59 | * Claimed to be opensourced but not active on GitHub yet. 60 | 61 | * SERPICO 62 | * Recommended 63 | * Reporting/Colaboration tool, similar to Dradis Framework 64 | * https://github.com/MooseDojo/SERPICO 65 | * By Rapid 7 researcher, good reporting engine 66 | 67 | ### Day 1 Group 2 68 | 69 | * Nishang (BlackHat Version) 70 | * PowerShell tool/framework for PenTesting 71 | * https://github.com/samratashok/nishang 72 | 73 | * SqlChop 74 | * SQL Injection detection tool 75 | * By Chinese CTF team Blue Lotus 76 | * Not open sourced 77 | 78 | * Rudra 79 | * Automated inspection of network capture files 80 | * https://github.com/7h3rAm 81 | * By researcher from Qualys 82 | 83 | * OWASP Distributed Web Honeypots Project 84 | * Recommended 85 | * https://www.owasp.org/index.php/OWASP_WASC_Distributed_Web_Honeypots_Project 86 | * By Ryan Barnett, Principle Security Research of Akamai, ModSecurity Project leader, https://twitter.com/ryancbarnett 87 | 88 | * CTF Tool 89 | * Recommended 90 | * Central repo of up-to-date security tools, easy install 91 | * https://github.com/zardus/ctf-tools 92 | * By former UCSB CTF team member, current member of "Shellhish" 93 | 94 | * Exploitpack 95 | * TBD 96 | * http://exploitpack.com/ 97 | 98 | * Dradis Framework 99 | * Recommended 100 | * extensible, cross-platform, open source collaboration framework for InfoSec teams 101 | * capable of importing from 15 popular tools 102 | * https://github.com/dradis/dradisframework 103 | 104 | * Breachgo 105 | * Maltego enhanced 106 | * https://www.youtube.com/watch?v=O-X5-1SB5uc 107 | * Not yet open-sourced 108 | 109 | * Intrigue 110 | * Recommended 111 | * AttackSurface discover(Recon) tool (combining DNS discovery, nmap, zmap, masscan result) 112 | * By Jonathan Cran, No.1 BugCrowd US employee, ex Pwnie Express CTO 113 | * http://intrigue.io/ 114 | * https://github.com/intrigueio/intrigue-core 115 | 116 | * ElastAlert 117 | * Recommended 118 | * Simple monitering/alerting framework using data in Elasticsearch 119 | * By Quentin Long, Yelp security engineer, SIEM expert 120 | 121 | ### Day 1 Group 3 122 | 123 | * WireEdit 124 | * WYSIWYG network packets editor. It allows editing packets at all stack layers in a simple point-and-click interface. 125 | * https://wireedit.com/ 126 | * Not open sourced but offers free license. 127 | 128 | * peepdf 129 | * Python tool to explore PDF files in order to find out if the file can be harmful or not. 130 | * http://eternal-todo.com/tools/peepdf-pdf-analysis-tool 131 | 132 | * CapTipper 133 | * Analyze HTTP malicious traffic from PCAP files 134 | * https://github.com/omriher/CapTipper 135 | 136 | * Openioc_Scan 137 | * forensic/malware analysis tools extending Volatility Framework 138 | * https://github.com/TakahiroHaruyama/openioc_scan 139 | 140 | * The Volatity Framework 141 | * open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples of Windows, Linux, Mac OS X, and Android systems. 142 | * https://github.com/volatilityfoundation/volatility 143 | 144 | * Burp-hash 145 | * Recommended 146 | * Burp plugin 147 | * Passively scan requests looking for hashed values. Looking for match values. Identify hash type too. 148 | * https://github.com/burp-hash/burp-hash 149 | 150 | * SAMLyze 151 | * SAML Security Analysis 152 | * Github Location not found, but similar post here: 153 | * http://blog.csnc.ch/author/rbischof/ 154 | 155 | * PixelCAPTCHA 156 | * TBD 157 | 158 | * CuckooDroid 159 | * Recommended 160 | * Automated malware analysis framework 161 | * https://github.com/idanr1986/cuckoo-droid 162 | 163 | Seclists 164 | * Recommended 165 | * It's a collection of multiple types of lists used during security assessments, collected in one place. 166 | * https://github.com/danielmiessler/SecLists 167 | 168 | Trend of Day One Arsenal 169 | Security Monitoring tools is migrating towards data warehouse monitoring (Splunk, Elastic Search, Kibana) 170 | 171 | ## 8/6/2015 Day Two 172 | ### Day 2 Group 1 173 | * Reissue Request Scripter 174 | * Recommended 175 | * Burp Plugin for generating python script to replay the request later on 176 | * https://github.com/h3xstream/http-script-generator 177 | 178 | * SimpleRisk 179 | * Recommended 180 | * Open Source Enterprise Risk management platform 181 | * http://www.simplerisk.org/ 182 | * https://github.com/simplerisk 183 | 184 | * WATOBO 185 | * efficient (semi-automated) web application security audit tool 186 | * free software 187 | * http://watobo.sourceforge.net/index.html 188 | 189 | * ChipWhisperer 190 | * Side channel power analysis tool (hardware) 191 | * https://www.assembla.com/spaces/chipwhisperer/wiki 192 | * https://github.com/newaetech/chipwhisperer 193 | 194 | * SpeedPhishing Framework (SPF) 195 | * Recommended 196 | * SPF is an open source simple email phishing tool/framework which can assist penetration testers in quickly deploying phishing exercises in minimal time. 197 | * https://github.com/tatanus/SPF 198 | * https://www.youtube.com/watch?v=wMPlO41lo80 199 | 200 | * D1C0M-X 201 | * Highly recommended 202 | * Medical device remote scan/exploit tool 203 | * By MICHAEL HUDSON, CEO OF INTROEXON 204 | 205 | * OWASP Broken Web Application VM V12 206 | * Recommended 207 | * A collection of vulnerable web applications for training 208 | * By Chuck Wills, Senior Technical Director with Mandiant (a FireEye Company) 209 | 210 | * SHINOBOT 211 | * A RAT simulator to evaluate an organization's ability to protect its networks from an advanced targeted attack 212 | * http://shinobot.com/top.php 213 | * .NET based freeware 214 | 215 | * Mana 216 | * Recommended 217 | * A Wi-Fi rogue access point toolkit whose purpose is getting as many clients connected, and getting as many credentials from their connections. 218 | * https://github.com/sensepost/mana 219 | * http://www.slideshare.net/sensepost/improvement-in-rogue-access-points-sensepost-defcon-22 220 | * https://youtu.be/i2-jReLBSVk 221 | 222 | 223 | * PEStudio 224 | * Recommended 225 | * PE assessment of a malware without even infecting a lab system or studying its code. 226 | * https://www.winitor.com/ 227 | 228 | ### Day 2 Group 2 229 | 230 | * TARDIS 231 | * Recommended 232 | * Tripwire Automated Reconnaissance and Deep Inspection System 233 | * ties together threat feed data such as STIX and vulnerability scan data and references log repositories for indicators of compromise(IoC) 234 | * Talk from the author: https://www.blackhat.com/us-15/briefings.html#my-bro-the-elk-obtaining-context-from-security-events 235 | * Need to understand STIX, compliance requirement, 236 | * About the code (lacks documentation) https://github.com/tripwire/tardis 237 | * About STIX: https://stix.mitre.org/ 238 | 239 | * Backdoor Factory(BDF) and BDFProxy 240 | * Recommended 241 | * open source framework for patching PE, ELF, and Mach-O binaries with payloads or shellcode. 242 | * Inject payload when victim downloads bianry executables! 243 | * Part of Kali-Linux, Veil-Evasion, BlackArch Linux, and MITMf. 244 | * https://github.com/secretsquirrel/the-backdoor-factory 245 | * https://github.com/secretsquirrel/BDFProxy 246 | 247 | * Digital Disease Tracking Tool 248 | * Recommended 249 | * Web-Based Tracking app is an alpha proof of concept visualization tool, inspired by epidemiology, for infection reason/time analysis 250 | * By Efrain Ortiz, director in the Market and Technology Innovation Group at Symantec Corporation 251 | * Currently only support Symantec Enterprise Antivirus 252 | 253 | * UTIP 254 | * UNSTRUCTURED THREAT INTELLIGENCE PROCESSING, automates phases of threat data extraction from unstructured sources, and maps extracted elements to the STIX standard. 255 | * Scrumblr and Sketchy (open-source provided by Netflix) to scrape advisories, the OpenNLP stack for natural language processing 256 | * By Elvis Hover, Accenture 257 | * NLP part not fully opensourced 258 | 259 | * Preeny 260 | * Binary analysis tool for interacting with binary 261 | * https://github.com/zardus/preeny 262 | * https://lolware.net/2015/04/28/nginx-fuzzing.html 263 | 264 | * Linux-Inject 265 | * Inject code into a Linux process, support x86, x86_64, and ARM. 266 | * By TYLER COLGAN from NCC GROUP 267 | * https://github.com/gaffe23/linux-inject 268 | 269 | * OWASP Dependecy Check 270 | * Recommended 271 | * Depencency checking tool, OWASP flagship project 272 | * https://www.owasp.org/index.php/OWASP_Dependency_Check 273 | * https://github.com/jeremylong/DependencyCheck 274 | 275 | * BTA 276 | * Recommended 277 | * open-source Active Directory security audit framework 278 | * https://bitbucket.org/iwseclabs/bta 279 | * By Joffrey Czarny, security researcher of Airbus Group Innovations (FR) 280 | 281 | * Noriben 282 | * Portable, Simple, Malware Analysis Sandbox 283 | * https://github.com/Rurik/Noriben 284 | * Slides at: http://www.slideshare.net/bbaskin/bh15-arsenal-noriben 285 | * By Brian Baskin, form RSA, http://www.ghettoforensics.com/ 286 | 287 | ### Day 2 Group 3 288 | 289 | * Chellam 290 | * Recommended 291 | * A Wi-Fi IDS/Firewall for Windows 292 | * https://www.youtube.com/watch?v=hHjkhwejmrw 293 | * By VIVEK RAMACHANDRAN, author of "Backtrack 5: Wireless Penetration Testing", founder of SecurityTube.net. http://www.vivekramachandran.com/ 294 | 295 | * LYNIS 296 | * Recommended 297 | * A Shell Script for Linux-like system security check/analysis 298 | * https://github.com/CISOfy/lynis/ 299 | 300 | * objective-sees OSX Security Tools 301 | * Highly Recommended 302 | * A Toolkit for OSX system security check/anlaysis 303 | * https://objective-see.com/products.html 304 | * By Patrick Wardle, Director of Research at Synack 305 | * BlackHat/Defcon talk at https://objective-see.com/blog.html 306 | 307 | * Kautilya 308 | * USB and other plug-in devide attack software 309 | * https://github.com/samratashok/Kautilya 310 | 311 | * Faraday 312 | * Integrated Penetration-Test Environment a multiuser Penetration test IDE. 313 | * https://github.com/infobyte/faraday 314 | * Supporting 40+ plugins https://github.com/infobyte/faraday/wiki/Plugin-List 315 | * Supporting different platforms: https://github.com/infobyte/faraday/wiki/Installation 316 | 317 | * ThreadFix 318 | * Recommended 319 | * a software vulnerability aggregation and management system 320 | * http://www.denimgroup.com/blog/denim_group/2015/07/secure-devops-threadfix.html 321 | * By Dan Cornell, CTO of Denim Group 322 | 323 | * Heybe 324 | * Recommended 325 | * A Pentesting Tool Kit 326 | * https://github.com/galkan 327 | * Detail regarding the author: http://www.galkan.net/ 328 | 329 | * Cuckoosploit 330 | * an environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox 331 | * https://github.com/davidoren/CuckooSploit 332 | * By David Oren from Checkpoint 333 | 334 | * Yard Stick One 335 | * A sub-1 GHz wireless transceiver controlled directly from your computer. 336 | * https://greatscottgadgets.com/yardstickone/ 337 | --------------------------------------------------------------------------------