Cloudlist is a multi-cloud tool for getting Assets from Cloud Providers. This is intended to be used by the blue team to augment Attack Surface Management efforts by maintaining a centralized list of assets across multiple clouds with very little configuration efforts.
List Cloud assets with multiple configurations. Support for ultiple cloud providers. Multiple output formats. Multiple filters. Highly extensible, making adding new providers a breeze.
Rescuezilla is an easy-to-use disk cloning and imaging application that's fully compatible with Clonezilla — the industry-standard trusted by tens of millions. Yes, Rescuezilla is the Clonezilla GUI (graphical user interface) that you might have been looking for. But Rescuezilla is more than a Clonezilla GUI! Disk imaging is the process of making a backup of your computer's hard drive which is managed as files stored on an external hard drive, and 'disk cloning' is the process of making a direct copy without needing a third drive for temporary storage. For many people, the alternative open-source tools such as Clonezilla are intimidating and difficult to use, so Rescuezilla provides an easy-to-use graphical environment like the leading commercial tools, Acronis True Image and Macrium Reflect.
Rescuezilla can be booted on any PC or Mac from a USB stick, and has been carefully developed to be fully interoperable with the Clonezilla. This means Rescuezilla can restore backups created by Clonezilla, and backups created by Rescuezilla can be restored using Clonezilla!
OpenEDR is a sophisticated, free, open source endpoint detection and response solution. It provides analytic detection with Mitre ATT&CK visibility for event correlation and root cause analysis of adversarial threat activity and behaviors in real time. This world-class endpoint telemetry platform is available to all cyber-security professionals, and every sized organization, to defend against threat actors and cyber criminals.
Suricata IDS is a free intrusion detection/prevention system and network security monitoring engine. This is a list of awesome things that go with it.
An ACME protocol client written purely in Shell (Unix shell) language.
Full ACME protocol implementation. Support ECDSA certs. Support SAN and wildcard certs. Simple, powerful and very easy to use. You only need 3 minutes to learn it. Bash, dash and sh compatible. Purely written in Shell with no dependencies on python. Self-contained, just one script is needed to issue, renew and install your certificates automatically. DOES NOT require root/sudoer access. Docker ready. IPv6 ready. Cron job notifications for renewal or error etc.
The Log File Navigator, lnav for short, is an advanced log file viewer for the small-scale. It is a terminal application that can understand your log files and make it easy for you to find problems with little to no setup. Log messages from different files are collated together into a single view. Automatic detection of log format. Automatic decompression of GZip and BZip2 files. Filter log messages based on regular expressions. Use SQL to analyze your logs.
Even works with systemfail's journals.
Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files. With ventoy, you don't need to format the disk over and over, you just need to copy the ISO/WIM/IMG/VHD(x)/EFI files to the USB drive and boot them directly. You can copy many files at a time and ventoy will give you a boot menu to select them. You can also browse ISO/WIM/IMG/VHD(x)/EFI files in local disks and boot them. x86 Legacy BIOS, IA32 UEFI, x86_64 UEFI, ARM64 UEFI and MIPS64EL UEFI are supported in the same way. Over 900 operating systems and counting (F/OSS and otherwise) have been tested and are known to work.
xmppipe redirects stdin/stdout in a shell pipeline to an XMPP MUC (XEP-0045) or a one to one chat. Supports flow control using stream management (XEP-0198). Optionally deals with overload by acting as a circuit breaker or by discarding messages. Works with line oriented tools like grep, sed and awk by outputting each message as a newline terminated, percent-encoded string. xmppipe can be used in shell scripts to quickly write interactive bots for monitoring systems or for sending alerts.
Requires libstrophe.
A port of the original iotop to C with additional features. Acts like top but for disk I/O. Good for keeping an eye on what's bogging your disk array down.
You can add a capability so that you don't need to be root to run it: sudo setcap 'cap_net_admin+eip' /path/to/iotop
Here's my command line: iotop -o -2 -6 -8
In the AUR as iotop-c.
The Ultimate Nginx Bad Bot, User-Agent, Spam Referrer Blocker, Adware, Malware and Ransomware Blocker, Clickjacking Blocker, Click Re-Directing Blocker, SEO Companies and Bad IP Blocker with Anti DDOS System, Nginx Rate Limiting and Wordpress Theme Detector Blocking. Stop and Block all kinds of bad internet traffic even Fake Googlebots from ever reaching your web sites.
Just what it says on the tin. Assumes a Digital Ocean droplet and you have root access.
A collection of handy Bash One-Liners, hotkeys, and terminal tricks for data processing and Linux system maintenance.
doggo is a modern command-line DNS client (like dig) written in Golang. It outputs information in a neat concise manner and supports protocols like DoH, DoT and DNSCrypt as well. It's totally inspired from dog which is written in Rust. I wanted to add some features to it but since I don't know Rust, I found it as a nice opportunity to experiment with writing a DNS Client from scratch. Human-readable output, optional JSON output. Multiple transport protocols. Supports multiple resolvers at once, IPv4 and IPv6 simultaneously.
In the AUR.
A reasonably reliable traffic per application monitor using BPF.
Receive notifications whenever a new program connects to the network, or when it's modified. Monitors your bandwidth, breaking down traffic by executable, hash, parent, domain, port, or user over time. Uses BPF for accurate, low overhead bandwidth monitoring and fanotify to watch executables for modification.
RecoverPy is a powerful tool that leverages your system capabilities to recover lost files. Unlike others, you can not only recover deleted files but also overwritten data. Every block of your partition will be scanned. You can even find a string in binary files. Uses grep, dd, and lsblk. Interactive.
In the AUR.
A collection of wrapper scripts that make it easy to run some of the more obscure ssh features without having to read the manpage every time.
In the AUR.
A collection of awesome security hardening guides, best practices, checklists, benchmarks, tools and other resources.
An intuitive remotely-accessible system performance monitoring and task management tool for servers and headless Raspberry Pi setups.
CryptoLyzer is a fast and flexible server cryptographic settings analyzer library for Python with an easy-to-use command line interface with both human- and machine-readable output. It works with multiple cryptographic protocols (SSL/TLS, opportunistic TLS, SSH) and analyzes
additional security mechanisms (web security related HTTP response header fields, JA3 tag).
This repo contains the PDF book The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss. The book was first published in October 2018 for purchase, but now I'm providing it for FREE to anyone interested in learning more about the magic of SSH tunnels and port redirection.
Repo contains the PDF for download. CC-BY-NCv4