Resources

CTFs:

Red-Team resources:

  • Creepy – Geolocation OSINT tool
  • Hash Analyzer – Tool to identify hash types
  • WAScan – Web Application Scanner
  • Sn1per – Automated pentest recon scanner
  • Impacket – Collection of Python classes/tools for working with network protocols
  • BloodHound – Identify highly complex attack paths in Active Directory
  • InfoG – Neat information gathering tool
  • OSCP prep tips – Site with tips and links for prepping for OSCP cert
  • DIY Rubber Ducky – A “Rubber Ducky” device using a Raspberry Pi Zero
  • Crackstation – A resource to quickly crack hashes against known breaches
  • Hashtopolis – Distributed hash cracking application

Blue-Team resources:

  • Gophish – Open-Source Phishing Framework
  • Wazuh – Open-Source security platform (SIEM, FIM, IDS, IR, etc.)
  • Graylog – Open-Source centralized log analyzer
  • DeepBlueCLI – PowerShell Module for Threat Hunting via Windows Event Logs
  • Cuckoo Sandbox – Open-Source automated malware analysis
  • Volatility – Open-Source memory forensics framework
  • Logstalgia – Open-Source web server access visualization tool (Mostly just looks cool)
  • IP-Tracker – Useful site for gathering OSINT information from an IP address

Newsfeeds & Podcasts:

Services:

  • ngrok – Simple program to create a public facing tunnel from anywhere
  • ZEROTIER – Service to create a virtual network between devices across the internet

CTF Write-ups: