Learn how to meet your challenging security and compliance goals.

Our blogs, videos, webinars, and other resources are designed to educate, inspire, and empower organizations to greater levels of assurance with expert advice, training, and guidance to elevate your security and compliance efforts.

Cyber Security Tools

IREMOS Instructors have built open source cyber security tools that support your work and help you implement better security. Search the lists to find the free tools available to help you get the job done.

Offensive Operations, Pen Testing, and Red Teaming

Slingshot Linux Distribution

Slingshot is an Ubuntu-based Linux distribution with the MATE Desktop Environment built for use in the SANS penetration testing curriculum and beyond.

Offensive Operations, Pen Testing, and Red Teaming

EX Tools

hese open source digital forensics tools can be used in a wide variety of investigations including cross validation of tools, providing insight into technical details not exposed by other tools.

Offensive Operations, Pen Testing, and Red Teaming

REMnux®

REMnux® is a Linux toolkit for reverse-engineering and analyzing malicious software. REMnux provides a curated collection of free tools created by the community.

Offensive Operations, Pen Testing, and Red Teaming

The C2 Matrix

Matrix of Command and Control Frameworks for Penetration Testing, Red Teaming, and Purple Teaming

Offensive Operations, Pen Testing, and Red Teaming

The DeRF

The DeRF, an open-source tool available on GitHub, consists of Terraform modules and a Cloud Run application written in Python.

Offensive Operations, Pen Testing, and Red Teaming

Sift Workstation

he SIFT Workstation is a collection of free and open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings.

Offensive Operations, Pen Testing, and Red Teaming

FOF-ELK

SOF-ELK® is a “big data analytics” platform focused on the typical needs of computer forensic investigators/analysts and information security operations personnel.

Offensive Operations, Pen Testing, and Red Teaming

Voltaire

Voltaire is a web-based indexing tool for GIAC certification examinations. Creating an index with Voltaire is a three phase process involving: documentation/note-taking, sorting &...

Offensive Operations, Pen Testing, and Red Teaming

VulnWhisperer

Aggregates vulnerability data and lets you report off it with ELK and allows tagging things such as PIC, HIPAA, critical asset, etc.

Offensive Operations, Pen Testing, and Red Teaming

DeepBlueCLI

A PowerShell Module for Threat Hunting via Windows Event Log.