Platform/tool type | Members |
Cybersecurity frameworks | NIST CSF, ISO/IEC 27000 family, CIS Controls, and FAIR (Factor Analysis of Information Risk) |
Cyber Intelligence frameworks and tools | MISP, STIX/TAXII, MITRE ATT&CK, and Open Source Intelligence (OSINT) Platforms like: Shodan, VirusTotal, and Censys |
Network security-oriented tools | Wireshark, Nmap, Suricata, Zeek, iptables, pfSense |
Computer security-oriented tools | ClamAV, OSSEC, Sysmon, Cuckoo Sandbox |
Vulnerability management | Nessus, OpenVAS, Intruder, Nikto, Paros Proxy, and SQLMap |
Event management systems (SIEM) | OSSIM, Security Onion, Greylog, Wazuh, Prelude SIEM, QRadar Community Edition, and the ELK stack (Elasticsearch, Logstash, Kibana) |
Identity management and access control | Keycloak, Shibboleth, Apache Syncope, FreeIPA, Okta, Kerberos, and Microsoft Azure Active Directory |
Security verification of software and web applications | OWASP ZAP (Zed Attack Proxy), Burp, Acunetix, BeEF, Wfuzz |
Incident response and forensic analysis | TheHive Project, Carbon Black (Cb) Response, Cyphon, FireEye Mandiant, EnCase Forensic, and Autopsy |
Encryption and Cryptography | OpenSSL, VeraCrypt, and Hashcat |
Pentesting | Kali Linux, Parrot Security OS, Arch Linux (BlackArch), Burp Suite, Aircrack-ng, Metasploit Framework, Social-Engineer Toolkit (SET), and Faraday |