Cyber Security Tools
IREMOS Instructors have built open source cyber security tools that support your work and help you implement better security. Search the lists to find the free tools available to help you get the job done.
Offensive Operations, Pen Testing, and Red Teaming
Slingshot Linux Distribution
Slingshot is an Ubuntu-based Linux distribution with the MATE Desktop Environment built for use in the SANS penetration testing curriculum and beyond.
Offensive Operations, Pen Testing, and Red Teaming
EX Tools
hese open source digital forensics tools can be used in a wide variety of investigations including cross validation of tools, providing insight into technical details not exposed by other tools.
Offensive Operations, Pen Testing, and Red Teaming
REMnux®
REMnux® is a Linux toolkit for reverse-engineering and analyzing malicious software. REMnux provides a curated collection of free tools created by the community.
Offensive Operations, Pen Testing, and Red Teaming
The C2 Matrix
Matrix of Command and Control Frameworks for Penetration Testing, Red Teaming, and Purple Teaming
Offensive Operations, Pen Testing, and Red Teaming
The DeRF
The DeRF, an open-source tool available on GitHub, consists of Terraform modules and a Cloud Run application written in Python.
Offensive Operations, Pen Testing, and Red Teaming
Sift Workstation
he SIFT Workstation is a collection of free and open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings.
Offensive Operations, Pen Testing, and Red Teaming
FOF-ELK
SOF-ELK® is a “big data analytics” platform focused on the typical needs of computer forensic investigators/analysts and information security operations personnel.
Offensive Operations, Pen Testing, and Red Teaming
Voltaire
Voltaire is a web-based indexing tool for GIAC certification examinations. Creating an index with Voltaire is a three phase process involving: documentation/note-taking, sorting &...
Offensive Operations, Pen Testing, and Red Teaming
VulnWhisperer
Aggregates vulnerability data and lets you report off it with ELK and allows tagging things such as PIC, HIPAA, critical asset, etc.
Offensive Operations, Pen Testing, and Red Teaming
DeepBlueCLI
A PowerShell Module for Threat Hunting via Windows Event Log.