awesome-nicc#

Awesome

A list of cybersecurity resources from the NJIT Information and Cybersecurity Club.

HTML version, Markdown version.


Entries#

This page lists all entries. Use links in the sidebar or click on tags to browse projects by category.


10 Types of Application Security Testing Tools#

List of different application security testing tools and methods.

Website

Web App

Training


A Graduate Course in Applied Cryptography Book#

“Throughout the book we present many case studies to survey how deployed systems operate. We describe common mistakes to avoid as well as attacks on real-world systems that illustrate the importance of rigor in cryptography.”

By Dan Boneh and Victor Shoup.

Website

Book

Training Programming


AC Hunter#

Tool for network C2 monitoring.

Website

Linux Proprietary Freemium

Networking Monitoring


Antisyphon Training#

Approachable, accessible, and affordable public and private training.

Website

Web App Proprietary Freemium

Training


Aperisolve#

Steganography analysis for multiple tools combined into one.

Website Source Code

Web App Freeware Source Given with No License

Steg Forensics


Awesome CTF#

“A curated list of Capture The Flag (CTF) frameworks, libraries, resources, softwares and tutorials.”

Website Source Code

Web App CC0-1.0

Training Forensics Crypto Web Steg OSINT Cracking Pwn Rev


Awesome Selfhosted#

“This is a list of Free Software network services and web applications which can be hosted on your own server(s)..”

Website Source Code

Web App CC-BY-SA-3.0

Sysadmin


Backdoors & Breaches#

Incident response card game. Can buy card deck or play online.

Website

Web App

Training


binwalk#

Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.

Website Source Code

Mac Linux MIT

Forensics


BlackArch Linux#

“BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.”

Website Source Code

Linux Multiple Licenses

Operating System


BurpSuite#

For pentesting web applications. Can replay and modify requests, fuzz request values, proxy between the browser and site, etc.

Website

Windows Mac Linux Proprietary Freemium

Web


Canarytokens#

“Canarytokens helps track activity and actions on your network.”

”Canarytokens are like motion sensors for your networks, computers and clouds. You can put them in folders, on network devices and on your phones.”

Website Source Code

Web App GPL-3.0

Networking Web


Clark#

Largest platform for building and sharing free cybersecurity curriculum.

Website

Web App Proprietary Freeware

Training


cloudtango#

Catalog of MSPs (managed service providers).

Website

Web App Proprietary Freeware

Employment


CMD Challenge#

“Test your shell knowledge by taking the CMD Challenge”

Website Source Code

Web App MIT

Training


Codecademy Cybersecurity#

Contains multiple cybersecurity focused courses.

Website

Web App Proprietary Freemium

Training


Competitive Programmer’s Handbook#

“The purpose of this book is to give you a thorough introduction to competitive programming.”

By Antti Laaksonen.

Website

Book

Training Programming


Computer Systems Security: Planning For Success#

“The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security.”

By Ryan Tolboom.

Website

Web App Book CC-BY-NC-SA-4.0

Training Crypto Web Networking


CUPP#

Common User Password Profiler

Generates password word lists based knowledge known about a user.

Website Source Code

Windows Mac Linux GPL-3.0

Cracking


CyberChef#

“The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis.”

Website Source Code

Web App Apache-2.0

Crypto


Datadog#

Infrastructure monitoring tool.

10 servers free for 2 years via GitHub Education Pack.

Website

Web App Windows Mac Linux Proprietary Freemium

Monitoring NJIT Student Access


Dcode.fr#

Many encode and decode tools for different ciphers.

Website

Web App Proprietary Freeware

Crypto


Deepsound#

Hides files within audio.

Website Source Code

Windows Freeware Source Given with No License

Steg Forensics


Dirb#

Dictionary scan of web servers.

Website Source Code

Linux GPL-2.0

Web


dnSpy#

.NET / Unity decompiler.

Website Source Code

Windows GPL-3.0

Rev


Enum_AzureSubdomains#

“A Metasploit Auxiliary module for enumerating public Azure services by locating valid subdomains through various DNS queries.”

Website Source Code

Windows Mac Linux Freeware Source Given with No License

Web Networking


Evilginx#

“Evilginx is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection.”

Website Source Code

Windows Mac Linux BSD-3-Clause

Web


F00L.DE#

Collection of miscellaneous tools such as vigenere cipher cracking, file analysis, etc.

Website

Web App Windows Mac Linux Freeware Source Given with No License

Crypto Networking Forensics Cracking


FederalPay.org#

“We are a non-governmental information portal built by federal employees, for federal employees.”

Website

Web App Proprietary Freeware

Employment


ForeverCTF#

CTF that is up indefinitely for practice.

Website

Web App Proprietary Freeware

Training


GCA Cybersecurity Toolkit#

A toolkit to help improve your personal cyber hygiene.

Website

Web App Proprietary Freeware

Training


Ghidra#

Suite of tools for software reverse engineering developed by the NSA.

Website Source Code

Windows Mac Linux Apache-2.0

Rev


Google Dorking Tutorial#

Tutorial on Google “dorking” which is the art of using search operators to find what you want.

Website

Web App Proprietary Freeware

Training OSINT


gpp-decrypt#

Ruby script used to decrypt Microsoft Group Policy preferences strings. Included in Kali by default.

Website Source Code

Windows Mac Linux Freeware Source Given with No License

Forensics Crypto


GTFOBins#

“GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.”

Website Source Code

Web App GPL-3.0

Exploitation Sysadmin


HackTheBox#

Test your skills against a variety of hacking labs!

Website

Web App Proprietary Freemium

Training


HackThisSite#

“HackThisSite.org is a free, safe and legal training ground for hackers to test and expand their ethical hacking skills with challenges, CTFs, and more.”

Website

Web App Proprietary Freeware

Web


HackTricks#

Collection of hacking tricks: e.g reverse shells, encoded text for web, etc.

Website Source Code

Web App CC-BY-NC-4.0

Training


Hashcat#

Password hash cracker.

Website Source Code

Windows Mac Linux MIT

Cracking


Hiration#

Cover letter and resume builder.

Website

Web App Proprietary Freeware

Employment NJIT Student Access


How To Secure A Linux Server#

“An evolving how-to guide for securing a Linux server.”

Website

CC-BY-SA-4.0

Training Sysadmin


Hydra#

Online password brute-force tool for SSH, RDP, HTTP, etc.

Website Source Code

Mac Linux AGPL-3.0

Cracking


ILSpy#

.NET / Unity decompiler.

Website Source Code

Windows Mac Linux MIT

Rev


DNS Remote Code Execution#

Video series exploiting WAN vulnerabilities in network devices.

Website

Training Video


Intro to Binary Exploitation#

Intro to Binary Exploitation video series.

Website

Training Video


IronGeek Unicode Steg#

Hides text within text.

Website

Web App Proprietary Freeware

Steg Forensics


John the Ripper#

Password hash cracker.

Website Source Code

Mac Linux GPL-2.0

Cracking


JWT.io#

Tool to decode and encode JSON Web Tokens.

Website Source Code

Web App MIT

Web


Kali Linux#

Pentesting focused OS based on Debian Linux. Many cybersecurity tools are preinstalled.

Website Source Code

Linux Multiple Licenses

Operating System


Kontra Application Security Training#

Interactive application security training.

Website

Web App Proprietary Freemium

Training


Kurose/Ross Networking Book#

Material on understanding computer networks.

By Jim Kurose and Keith Ross.

Website

Web App Book Proprietary Freeware

Training Networking


learnpython.org#

Python references and tutorials.

Website Source Code

Web App Proprietary Freeware

Training Programming


Linux auditd for Threat Detection#

Blog post on configuring auditd on Linux systems.

Website

Web App Book

Training Sysadmin


LOLBAS#

“The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques.”

Website Source Code

Web App GPL-3.0

Exploitation Sysadmin


Malcat#

“Malcat is a feature-rich hexadecimal editor / disassembler for Windows and Linux targeted to IT-security professionals.”

Website

Windows Linux Proprietary Freemium

Rev


Metasploit#

“The world’s most used penetration testing framework.”

Website Source Code

Windows Mac Linux BSD-3-Clause

Pwn Exploitation Web Networking


Metasploitable#

“Metasploitable is an intentionally vulnerable Linux virtual machine.”

Website Source Code

Linux Multiple Licenses

Training


Microsoft Security Complaince Toolkit#

“Policy Analyzer is a utility for analyzing and comparing sets of Group Policy Objects (GPOs). It can highlight when a set of Group Policies has redundant settings or internal inconsistencies, and can highlight the differences between versions or sets of Group Policies.”

Website

Windows Proprietary Freeware

Forensics Sysadmin


National Cyber Scholarship Foundation#

“National Cyber Scholarship Foundation (NCSF) has launched a national initiative to identify and develop a new generation of Cyber Stars.”

Website

Scholarship


NCAE CyberGames#

“NCAE Cyber Games is dedicated to inspiring college students to enter the exciting (and sometimes profitable!) realm of cyber competitions.”

Website

Competition Training


NetBox#

Network engineer tool for IPAM, provisioning, routing, diagrams, etc.

Website Source Code

Linux Apache-2.0

Sysadmin Networking


NetworkMiner#

NetworkMiner is an open source network forensics tool that extracts artifacts, such as files, images, emails and passwords, from captured network traffic in PCAP files.

Website Source Code

Windows Linux GPL-2.0

Networking Forensics


CISA National Initiative for Cybersecurity Careers and Studies#

“NICCS is the premier online resource for cybersecurity training, education, and career information.”

Website

Web App Proprietary Freeware

Training Employment


Nightmare Bin/Rev Guide#

Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges.

Website Source Code

Web App Freeware Source Given with No License

Training Rev


NJIT Secure Computing Initiative#

“The NJIT Secure Computing Initiative (SCI) seeks to award scholarships as part of the CyberCorps® Scholarship for Service (SFS) program.”

Website

Scholarship


Nmap#

Network port scanner tool.

Website Source Code

Windows Mac Linux Nmap-PSL

Networking


OpenStego#

Stegonography application for data hiding and watermarking.

Website Source Code

Windows Mac Linux GPL-2.0

Steg Forensics


OSINT Framework#

Guide to assist in gathering information while performing OSINT.

Website Source Code

Web App MIT

OSINT


OSINT Techniques Book#

“Resources for Uncovering Online Information”

By Michael Bazzell.

Website

Book

OSINT Training


OutGuess#

“Outguess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources.”

Website Source Code

Linux BSD-4-Clause

Steg Forensics


OverTheWire#

Learn Linux basics through fun-filled games.

Website

Web App Proprietary Freeware

Training


OWASP Top Ten#

“The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.”

Website Source Code

Web App CC-BY-SA-4.0

Web


OWASP WebGoat#

“WebGoat is a deliberately insecure application that allows interested developers just like you to test vulnerabilities commonly found in Java-based applications that use common and popular open source components.”

Website Source Code

Windows Mac Linux GPL-2.0

Web


OWASP ZAP#

For pentesting web applications. Can replay and modify requests, fuzz request values, proxy between the browser and site, etc.

Website Source Code

Windows Mac Linux Apache-2.0

Web


Parrot Linux#

Another pentesting focused OS based on Kali.

Website Source Code

Linux Multiple Licenses

Operating System


Payloads All The PDFs#

“A list of crafted malicious PDF files to test the security of PDF readers and tools.”

Website Source Code

Apache-2.0

Exploitation


Payloads All The Things#

“A list of useful payloads and bypasses for Web Application Security.”

Website Source Code

Web App MIT

Training Networking Exploitation Sysadmin Web


PentesterLab#

Learn how to manually exploit web applications!

Website

Web App Proprietary Freemium

Training


picoGym#

CTF that is up indefinitely for practice.

Website Source Code

Web App Proprietary Freeware

Training


PortSwigger Web Security Academy#

Free, online web security training from the creators of BurpSuite!

Website

Web App Proprietary Freeware

Training


PSBits Offline GPO Analysis#

Analyze Microsoft Group Policy files offline.

Website Source Code

Windows Unlicense

Forensics


Pwntools#

Pwntools is a python ctf library designed for rapid exploit development.

Website Source Code

Mac Linux Multiple Licenses

Pwn Exploitation


QRazyBox#

“QR Code Analysis and Recovery Toolkit”

Website Source Code

Web App MIT

Steg


Rapid Tables#

Collection of different converter tools and calculators.

Website

Web App Proprietary Freeware

Crypto


Secure the Future#

Palo Alto Network’s academic cybersecurity competition.

Website

Competition Training


Security Certification Roadmap#

A roadmap of differnet cybersecurity certifications.

Website Source Code

Web App CC-BY-SA-4.0

Training


shellscript.sh#

Tutorials for bash scripting.

Website

Web App Proprietary Freeware

Training


Shodan#

Search engine for IoT devices. Can search for publically accessible servers based on details such as header, geolocation, etc.

Website

Web App Proprietary Freemium

Web


sig2n#

Python scripts to perform JWT algorithm confusion.

Usage instructions from PortSwigger here.

Website Source Code

Windows Mac Linux GPL-3.0

Web Crypto


Snort#

IDS/IPS that does packet monitoring and logging based on rules.

Website Source Code

Windows Linux GPL-2.0

Networking Monitoring


Snyk CTF 101 Workshop#

“Check out this hands-on, virtual workshop to learn how to solve Capture the Flag (CTF) challenges, including pwn and web. After the workshop, you’ll have the security skills and experience to compete in CTFs.”

Website

Web App Proprietary Freeware

Training


Spectra Assure Community#

“Spectra Assure Community monitors open source packages to identify malware, code tampering and indicators of software supply chain attacks.”

Website

Web App Proprietary Freemium

Programming


Stegdetect#

Abandoned tool for detecting steganographic content in images.

Website Source Code

Linux BSD-4-Clause

Steg Forensics


StegOnline#

Online Image Steganography Tool for Embedding and Extracting data through LSB techniques.

Website Source Code

Web App WTFPL

Steg Forensics


Suricata#

IDS/IPS that does packet monitoring and logging based on rules. Similar to Snort but multithreaded.

Website Source Code

Windows Linux GPL-2.0

Networking Monitoring


tcpdump#

CLI data network packet analyzer. Can dump to pcap files.

Website Source Code

Windows Mac Linux BSD-3-Clause

Networking


TryHackMe#

Hand-on cyber security training through real-world scenarios.

Website

Web App Proprietary Freemium

Training


VirtualBox#

Virtual machine hypervisor. Generally used to create Kali or Parrot VMs separate from your host operating system.

Website Source Code

Windows Mac Linux GPL-3.0

Operating System


VulnHub#

Collection of vulnerable VM images.

Website

Multiple Licenses

Training


Wireshark#

Network packet sniffer that can capture from interfaces in real time or read pcap files.

Website Source Code

Windows Mac Linux GPL-2.0

Networking


Zerodium#

Bug bounty program.

Website

Employment


List of Licenses#


Contributing#

Contributing guidelines can be found here.

License#

This list is under the Creative Commons Attribution-ShareAlike 3.0 Unported License. Terms of the license are summarized here.
Markdown and HTML generating code adapted from the awesome-selfhosted community. Changes were made to page verbage and formatting.