Skip to content
generated from AOrps/readme

A list of cybersecurity resources from the NJIT Information and Cybersecurity Club.

License

Notifications You must be signed in to change notification settings

NJITICC/awesome-nicc

Repository files navigation

awesome-nicc

Awesome

A list of cybersecurity resources from the NJIT Information and Cybersecurity Club.

HTML version, Markdown version.

Click here to return to the NICC website.


Table of contents


Entries

Competition

^ back to top ^

Cybersecurity competitions and resources for them.

  • NCAE CyberGames - "NCAE Cyber Games is dedicated to inspiring college students to enter the exciting (and sometimes profitable!) realm of cyber competitions."
  • Secure the Future - Palo Alto Network's academic cybersecurity competition.

Cracking

^ back to top ^

Tools to be used for username/password cracking.

  • CUPP - Common User Password Profiler

    Generates password word lists based knowledge known about a user. GPL-3.0 Windows/Mac/Linux
  • Hashcat - Password hash cracker. (Source Code) MIT Windows/Mac/Linux
  • Hydra - Online password brute-force tool for SSH, RDP, HTTP, etc. AGPL-3.0 Mac/Linux
  • John the Ripper - Password hash cracker. (Source Code) GPL-2.0 Mac/Linux

Crypto

^ back to top ^

Anything related to cryptography.

  • CyberChef - "The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis." (Source Code) Apache-2.0 Web App
  • Dcode.fr - Many encode and decode tools for different ciphers. Proprietary/Freeware Web App
  • F00L.DE - Collection of miscellaneous tools such as vigenere cipher cracking, file analysis, etc. Freeware/Source Given with No License Web App/Windows/Mac/Linux
  • Rapid Tables - Collection of different converter tools and calculators. Proprietary/Freeware Web App

Employment

^ back to top ^

Resources for finding jobs.

  • cloudtango - Catalog of MSPs (managed service providers). Proprietary/Freeware Web App
  • FederalPay.org - "We are a non-governmental information portal built by federal employees, for federal employees." Proprietary/Freeware Web App
  • Hiration - Cover letter and resume builder. Proprietary/Freeware Web App
  • Zerodium - Bug bounty program.

Exploitation

^ back to top ^

General exploitation category for things that don't fit in other places.

  • GTFOBins - "GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems." (Source Code) GPL-3.0 Web App
  • LOLBAS - "The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques." (Source Code) GPL-3.0 Web App
  • Payloads All The PDFs - "A list of crafted malicious PDF files to test the security of PDF readers and tools." Apache-2.0 ``

Forensics

^ back to top ^

Anything related to computer forensics.

  • binwalk - Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images. MIT Mac/Linux
  • gpp-decrypt - Ruby script used to decrypt Microsoft Group Policy preferences strings. Included in Kali by default. (Source Code) Freeware/Source Given with No License Windows/Mac/Linux
  • Microsoft Security Complaince Toolkit - "Policy Analyzer is a utility for analyzing and comparing sets of Group Policy Objects (GPOs). It can highlight when a set of Group Policies has redundant settings or internal inconsistencies, and can highlight the differences between versions or sets of Group Policies." Proprietary/Freeware Windows
  • oletools - Python tools to analyze Microsoft OLE2 files (used in Office, Outlook, MSI files). BSD-2-Clause Windows/Linux/Mac
  • PSBits Offline GPO Analysis - Analyze Microsoft Group Policy files offline. Unlicense Windows

Monitoring

^ back to top ^

Tools to be used for monitoring systems and networks.

  • Datadog - Infrastructure monitoring tool.

    10 servers free for 2 years via GitHub Education Pack. Proprietary/Freemium Web App/Windows/Mac/Linux

Networking

^ back to top ^

Anything related to computer networking.

  • AC Hunter - Tool for network C2 monitoring. Proprietary/Freemium Linux
  • Canarytokens - "Canarytokens helps track activity and actions on your network."

    "Canarytokens are like motion sensors for your networks, computers and clouds. You can put them in folders, on network devices and on your phones." (Source Code) GPL-3.0 Web App
  • NetworkMiner - NetworkMiner is an open source network forensics tool that extracts artifacts, such as files, images, emails and passwords, from captured network traffic in PCAP files. (Source Code) GPL-2.0 Windows/Linux
  • Nmap - Network port scanner tool. (Source Code) Nmap-PSL Windows/Mac/Linux
  • Snort - IDS/IPS that does packet monitoring and logging based on rules. (Source Code) GPL-2.0 Windows/Linux
  • Suricata - IDS/IPS that does packet monitoring and logging based on rules. Similar to Snort but multithreaded. (Source Code) GPL-2.0 Windows/Linux
  • tcpdump - CLI data network packet analyzer. Can dump to pcap files. (Source Code) BSD-3-Clause Windows/Mac/Linux
  • Wireshark - Network packet sniffer that can capture from interfaces in real time or read pcap files. (Source Code) GPL-2.0 Windows/Mac/Linux

NJIT Student Access

^ back to top ^

Software that is given to us as NJIT students.

Operating System

^ back to top ^

Computer operating systems.

  • BlackArch Linux - "BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers." (Source Code) Multiple Licenses Linux
  • Kali Linux - Pentesting focused OS based on Debian Linux. Many cybersecurity tools are preinstalled. (Source Code) Multiple Licenses Linux
  • Parrot Linux - Another pentesting focused OS based on Kali. (Source Code) Multiple Licenses Linux
  • VirtualBox - Virtual machine hypervisor. Generally used to create Kali or Parrot VMs separate from your host operating system. (Source Code) GPL-3.0 Windows/Mac/Linux

OSINT

^ back to top ^

Anything related to open source intelligence.

Programming

^ back to top ^

Anything related to programming.

  • Spectra Assure Community - "Spectra Assure Community monitors open source packages to identify malware, code tampering and indicators of software supply chain attacks." Proprietary/Freemium Web App

Pwn

^ back to top ^

Tools related to exploting binaries (common in CTFs).

  • Metasploit - "The world’s most used penetration testing framework." (Source Code) BSD-3-Clause Windows/Mac/Linux
  • Pwntools - Pwntools is a python ctf library designed for rapid exploit development. Multiple Licenses Mac/Linux

Rev

^ back to top ^

Anything related to reverse engineering software.

  • dnSpy - .NET / Unity decompiler. GPL-3.0 Windows
  • Ghidra - Suite of tools for software reverse engineering developed by the NSA. (Source Code) Apache-2.0 Windows/Mac/Linux
  • ILSpy - .NET / Unity decompiler. MIT Windows/Mac/Linux
  • Malcat - "Malcat is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals." Proprietary/Freemium Windows/Linux

Scholarship

^ back to top ^

Education scholarship programs.

  • National Cyber Scholarship Foundation - "National Cyber Scholarship Foundation (NCSF) has launched a national initiative to identify and develop a new generation of Cyber Stars."
  • NJIT Secure Computing Initiative - "The NJIT Secure Computing Initiative (SCI) seeks to award scholarships as part of the CyberCorps® Scholarship for Service (SFS) program."

Steg

^ back to top ^

Anything related to steganography.

  • Aperisolve - Steganography analysis for multiple tools combined into one. (Source Code) Freeware/Source Given with No License Web App
  • Deepsound - Hides files within audio. Freeware/Source Given with No License Windows
  • IronGeek Unicode Steg - Hides text within text. Proprietary/Freeware Web App
  • OpenStego - Stegonography application for data hiding and watermarking. (Source Code) GPL-2.0 Windows/Mac/Linux
  • OutGuess - "Outguess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources." BSD-4-Clause Linux
  • QRazyBox - "QR Code Analysis and Recovery Toolkit" (Source Code) MIT Web App
  • Stegdetect - Abandoned tool for detecting steganographic content in images. BSD-4-Clause Linux
  • StegOnline - Online Image Steganography Tool for Embedding and Extracting data through LSB techniques. (Source Code) WTFPL Web App

Sysadmin

^ back to top ^

Anything related to systems administration.

  • Awesome Selfhosted - "This is a list of Free Software network services and web applications which can be hosted on your own server(s).." (Source Code) CC-BY-SA-3.0 Web App
  • NetBox - Network engineer tool for IPAM, provisioning, routing, diagrams, etc. (Source Code) Apache-2.0 Linux

Training

^ back to top ^

Training resources.

Video

^ back to top ^

Videos.

Web

^ back to top ^

Anything related to websites and website exploitation.

  • BurpSuite - For pentesting web applications. Can replay and modify requests, fuzz request values, proxy between the browser and site, etc. Proprietary/Freemium Windows/Mac/Linux
  • Dirb - Dictionary scan of web servers. GPL-2.0 Linux
  • Enum_AzureSubdomains - "A Metasploit Auxiliary module for enumerating public Azure services by locating valid subdomains through various DNS queries." Freeware/Source Given with No License Windows/Mac/Linux
  • Evilginx - "Evilginx is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection." BSD-3-Clause Windows/Mac/Linux
  • HackThisSite - "HackThisSite.org is a free, safe and legal training ground for hackers to test and expand their ethical hacking skills with challenges, CTFs, and more." Proprietary/Freeware Web App
  • JWT.io - Tool to decode and encode JSON Web Tokens. (Source Code) MIT Web App
  • OWASP Top Ten - "The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications." (Source Code) CC-BY-SA-4.0 Web App
  • OWASP WebGoat - "WebGoat is a deliberately insecure application that allows interested developers just like you to test vulnerabilities commonly found in Java-based applications that use common and popular open source components." (Source Code) GPL-2.0 Windows/Mac/Linux
  • OWASP ZAP - For pentesting web applications. Can replay and modify requests, fuzz request values, proxy between the browser and site, etc. (Source Code) Apache-2.0 Windows/Mac/Linux
  • Shodan - Search engine for IoT devices. Can search for publically accessible servers based on details such as header, geolocation, etc. Proprietary/Freemium Web App
  • sig2n - Python scripts to perform JWT algorithm confusion.

    Usage instructions from PortSwigger here. (Source Code) GPL-3.0 Windows/Mac/Linux
  • WhatWeb - Scans websites to recognize what software is being used to power them. (Source Code) GPL-2.0 Windows/Mac/Linux/Web App

List of Licenses

^ back to top ^


Contributing

Contributing guidelines can be found here.

License

This list is under the Creative Commons Attribution-ShareAlike 3.0 Unported License. Terms of the license are summarized here.
Markdown and HTML generating code adapted from the awesome-selfhosted community. Changes were made to page verbage and formatting.

About

A list of cybersecurity resources from the NJIT Information and Cybersecurity Club.

Resources

License

Stars

Watchers

Forks