ISS Diploma 2026 — Malware Analyst & Purple Team Specialist in progress. Intensive labs in malware analysis, computer forensics, web application security, and Windows Server. Two years of live production experience: WordPress hardening, WAF tuning, malware scanning, and incident documentation at a real organisation. Driven by pattern recognition, precision, and a commitment to defending what matters.
Two years of operational WordPress security — hardening configs, tuning firewalls, governing plugins, and maintaining recovery discipline. Real work, documented.
Building toward detection and response work — grounded in ISS lab coursework across malware analysis, forensics, OS exploitation, and secure networking.
Hardware troubleshooting, OS rebuilds, imaging, and migration — paired with the documentation discipline that makes security work reproducible and auditable.
Academic penetration test covering network reconnaissance, open port analysis, misconfigured services, and unpatched exposure points. Delivered a prioritised remediation report with CVE references and MITRE ATT&CK mappings.
Full-stack interactive web application built with a security-conscious approach: input validation, parameterised queries, and clean data flow from UI to database layer.
Two years of weekly production security work at Music Inc.: WordPress hardening, WAF rule tuning, malware scanning, plugin CVE monitoring, and incident documentation. Real-world, not a lab. Real WAF, real malware events, real recovery drills.
Commands: help · whoami · skills · certs · projects · contact · roadmap · stack · clear
Whether you need a purple team analyst, a malware analyst, a cloud security specialist, or someone who writes clear, precise incident reports — I am open to connecting. Tell me what you are defending and what your organisation values.
Responding to every serious inquiry within 48 hours. Based in Canada — open to remote and hybrid roles.
A 52-week structured path designed for 2026 and beyond — cloud-native, AI-security-aware, and built around the skills that cannot be automated away. Click any phase to expand.
Real tools from academic labs, two years of operational security, and ongoing self-study. Colour-coded honestly — green is operational, yellow is actively learning, grey is planned. → Full Tools Lab: 65 tools with commands & cert mapping ↗
Oregon Trail taught resource management and risk assessment before those terms existed in my vocabulary. Games where decisions had permanent consequences — no respawns, limited supplies, a long road ahead. That exact mindset transfers to incident response and threat modelling.
Two years managing web security for a live music company put me inside the creative industry — real artists, real stakes, real malware events. Music is a constant backdrop to late-night lab sessions and log analysis. Lo-fi keeps the focus when everything else is noise.
Hiking in the mountains and forests, observing patterns in the natural world — the Fibonacci sequence in leaf spirals, fractals in mountain ridges. The same pattern-recognition instinct that makes a good analyst.
Beyond the coursework — DEFCON archives, MalwareTech write-ups, 13Cubed forensics walkthroughs, Detection Engineering Weekly. The field moves fast. Genuine curiosity keeps the learning going when credentials alone would plateau.
Open-world cybersecurity teaching platform — built on real threat intelligence, not textbook theory. 9 operative classes · 11 threat zones · 35 missions · 4-tier progression · Real 2025–2026 attack techniques including ROP chains, supply chain compromise, process injection, and LotL/LOLBins — mapped to MITRE ATT&CK v18 and NIST NICE Workforce Framework. Live CVE feed from CISA KEV · XP system · skill tree · tool arsenal · 21 player profiles. Three modes: Professional terminal · Security Awareness with full security tool guide · Senior / Consumer Awareness with GrapheneOS recommendations and consumer app guide. Plus Industry Threats — sector-specific threat intelligence for Healthcare, Finance, Retail, and Education with real breach case studies.
The feeds I actually follow. Keeping up with the threat landscape isn't optional — it's part of the job. These are the sources that matter.
The largest practitioner-run cybersecurity community. Real discussions on tools, incidents, career advice, and breaking news — unfiltered.
reddit.com/r/cybersecurityLong-form investigative journalism on state-sponsored attacks, zero-days, and the policy implications of major breaches. Kim Zetter-tier writing.
wired.com/securityFast-moving daily coverage of data breaches, ransomware, and threat actor activity. Good for staying current on the velocity of incidents.
cybernews.comHigh-volume threat intelligence and CVE coverage. Essential for keeping up with active exploits, new malware families, and vulnerability disclosures.
thehackernews.comBrian Krebs — the gold standard in cybercrime investigation. Deep dives into fraud rings, botnet operators, and criminal infrastructure. Required reading.
krebsonsecurity.comBest technical coverage of ransomware campaigns, malware analysis, and Windows security. Practitioners write for practitioners.
bleepingcomputer.comDaily threat diaries from SANS instructors. Technical, dense, and current. The closest thing to a daily briefing written by analysts who actually defend networks.
isc.sans.eduEnterprise-level threat intelligence, vendor research, and practitioner features. Good for understanding the business side of security alongside the technical.
darkreading.comThe world's most widely-used network protocol analyser. Captures and dissects traffic in real time across 3000+ protocols. Essential for SOC analysts, network forensics, and incident response.
ip.addr == 192.168.1.5 && tcp.flags.syn == 1
http.request.method == "POST"
tshark -i eth0 -w capture.pcap
dns.qry.name contains "malicious"
The definitive network scanner. Discovers hosts, open ports, running services, OS fingerprints, and vulnerabilities via NSE scripts. Core tool for every penetration test and network audit.
nmap -sC -sV -oN scan.txt 10.10.10.5
nmap -p- --min-rate 5000 -T4 target
nmap -sU --top-ports 20 target
nmap --script vuln target
Cisco's open-source IDS/IPS with real-time traffic analysis and packet logging. Uses signature-based detection with a vast community ruleset. Deploy inline (IPS) or passive (IDS).
snort -c /etc/snort/snort.conf -i eth0
alert tcp any any -> $HOME_NET 22 (msg:"SSH"; sid:1001;)
snort -r capture.pcap -c snort.conf
High-performance multi-threaded IDS/IPS/NSM engine. Compatible with Snort rules, adds protocol detection, file extraction, TLS certificate logging, and EVE JSON output for SIEM ingestion.
suricata -c /etc/suricata/suricata.yaml -i eth0
suricata-update # update rulesets
jq '.alert' /var/log/suricata/eve.json
Enterprise network performance monitoring. Automated topology mapping, SNMP-based device polling, bandwidth analysis, and alerting. Widely deployed in large enterprises. Note: Supply chain compromise in 2020 (SUNBURST/SolarWinds hack).
SNMP polling · NetFlow · sFlow · jFlow
Orion SDK — REST API for automation
NCM — network configuration management
Network analysis framework that generates rich log files (conn.log, dns.log, http.log, ssl.log, files.log) rather than raw packet captures. Essential for threat hunting and security monitoring pipelines.
zeek -C -r capture.pcap
cat conn.log | zeek-cut id.orig_h id.resp_h
cat dns.log | zeek-cut query | sort | uniq -c
Lightweight CLI packet analyser built into every Unix/Linux system. No GUI — pure terminal power. Essential for remote capture when Wireshark isn't available, and for quick on-box triage.
tcpdump -i eth0 -w output.pcap
tcpdump -nn -i eth0 host 10.0.1.5
tcpdump port 443 -A -s0
Comprehensive infrastructure monitoring covering servers, VMs, networks, and IoT devices. Free up to 100 sensors. Supports SNMP, WMI, REST, packet sniffer, and custom scripts.
Auto-discovery of network devices via SNMP
Custom sensors: PowerShell, Python, EXE
Alerting: email, SMS, push, webhooks
Scans the entire internet in under 6 minutes. Asynchronous transmission — up to 10M packets/sec. Use for large-scale asset discovery, attack surface mapping, and finding exposed services at scale.
masscan -p80,443,8080 10.0.0.0/8 --rate=10000
masscan -p0-65535 192.168.1.0/24 -oJ out.json
Open-source firewall/router platform based on FreeBSD. Full stateful firewall, VPN (OpenVPN/WireGuard/IPsec), IDS/IPS via Suricata plugin, traffic shaping, and VLAN segmentation. Used in home labs to enterprise networks.
Stateful packet filtering + NAT rules
OpenVPN / WireGuard / IPsec tunnels
Suricata IDS/IPS package integration
Passive network forensic analysis tool. Reconstructs files, images, emails, and credentials from pcap files. Excellent for CTF challenges and incident response pcap analysis. GUI-based.
Extracts files/images from HTTP sessions
Reconstructs credentials from cleartext
OS fingerprinting from TCP/IP stack
High-speed web-based traffic analysis. Monitors network flows in real time with geo-location, protocol breakdown, and security alerts. Integrates with Suricata for IDS alerts overlay on traffic view.
ntopng -i eth0 -w 3000 # web UI port 3000
NetFlow/sFlow/IPFIX collector support
REST API for SIEM integration
The industry-standard web application security testing platform. Intercepts, modifies, and replays HTTP/S requests. Proxy, Scanner, Repeater, Intruder, Decoder — the complete web pentest toolkit. Community edition is free; Pro adds active scanner.
Proxy → intercept & modify live requests
Intruder → payload fuzzing (brute force, fuzzing)
Repeater → manual request manipulation
Scanner → automated vuln detection (Pro)
OWASP's free web application scanner. Automated active/passive scanning, spider, fuzzer, and API testing. Excellent for CI/CD pipeline integration (headless mode). The free alternative to Burp Pro for automated scanning.
zap-cli quick-scan --self-contained https://target.com
docker run -t owasp/zap2docker-stable zap-full-scan.py -t https://target.com
Enterprise-grade Static Application Security Testing. Analyses source code for vulnerabilities without execution. Supports 25+ languages. Deep data-flow analysis finds SQLi, XSS, path traversal across complex codebases. Integrates with Azure DevOps, Jenkins, GitHub Actions.
Data-flow analysis across function boundaries
OWASP Top 10 / SANS 25 coverage
IDE plugins: VS Code, IntelliJ, Eclipse
Cloud-based AppSec platform covering SAST, DAST, SCA (open-source), and manual penetration testing. Provides eLearning to fix found vulnerabilities. Widely used for compliance (FedRAMP, PCI-DSS). Policy-based gates in CI/CD pipelines.
Static (SAST) — binary + source upload
Dynamic (DAST) — authenticated web crawl
Software Composition Analysis (SCA)
Automatic SQL injection detection and exploitation tool. Supports all major databases (MySQL, Oracle, MSSQL, PostgreSQL). Can dump databases, crack hashes, read/write files, and execute OS commands via SQLi.
sqlmap -u "http://site.com/?id=1" --dbs
sqlmap -u URL -D dbname -T users --dump
sqlmap --level=5 --risk=3 --tamper=space2comment
Developer-first security platform for finding and fixing vulnerabilities in open-source dependencies, containers, IaC, and code. Deep integration with GitHub/GitLab/Bitbucket. SCA leader — tracks CVEs in npm, PyPI, Maven, etc.
snyk test # scan project dependencies
snyk container test nginx:latest
snyk iac test ./terraform/
Fast, lightweight SAST with a simple rule syntax that matches code patterns. 3000+ community rules for finding security bugs in 30+ languages. Used in CI/CD pipelines for shift-left security. Rules as YAML — security teams write custom detections easily.
semgrep --config=auto ./src
semgrep --config=p/owasp-top-ten ./
semgrep --config=p/python-security ./
Web server scanner detecting dangerous files, outdated software, server misconfigurations, and common vulnerabilities. Tests 6700+ items. Noisy — detected by IDS. Best used in authorised engagements for quick server hardening checks.
nikto -h https://target.com -o report.txt
nikto -h target.com -port 8080,8443
Fast web content discovery via wordlist-based directory/file fuzzing. Gobuster is Go-based and concurrent; ffuf is ultra-fast with advanced filtering. Find hidden paths, admin panels, backup files, and subdomains.
gobuster dir -u http://target -w /usr/share/seclists/...
ffuf -u http://target/FUZZ -w wordlist.txt -fc 404
ffuf -u http://FUZZ.target.com -w subdomains.txt
Continuous code quality and security analysis. Tracks security hotspots, bugs, vulnerabilities, and code smells across 30 languages. Community edition free. Gate builds on quality/security criteria. Used by 300K+ organisations globally.
sonar-scanner -Dsonar.projectKey=myproject
GitHub Actions: SonarCloud action (free for OSS)
Automated web vulnerability scanner with deep-crawl engine. Finds SQLi, XSS, XXE, SSRF, misconfigurations in web apps and APIs. Proof-based scanning verifies exploitability. Integrates with Jira, GitHub, and CI/CD pipelines.
AcuSensor (IAST) agent for deeper coverage
OpenAPI/Swagger/WSDL API auto-discovery
Compliance reports: PCI-DSS, HIPAA, ISO27001
Palo Alto's CNAPP (Cloud Native Application Protection Platform). Combines CSPM, CWPP, CIEM, DSPM and container/Kubernetes security. Covers AWS, Azure, GCP. Real-time compliance posture against CIS Benchmarks, SOC2, PCI-DSS.
Cloud Security Posture Management (CSPM)
Cloud Workload Protection (CWPP) — runtime
CIEM — Identity entitlement management
Centralised AWS security findings aggregator. Consolidates alerts from GuardDuty, Inspector, Macie, IAM Access Analyzer, and third-party tools. Automated compliance checks against CIS AWS Foundations, PCI-DSS, and NIST.
GuardDuty · Inspector · Macie · IAM Analyzer
aws securityhub get-findings --filters ...
EventBridge → Lambda auto-remediation
Microsoft's CSPM and cloud workload protection for Azure, AWS, and GCP. Secure Score dashboard, threat protection for VMs/containers/databases/App Service. Defender for Servers includes Microsoft Defender for Endpoint integration.
Secure Score — posture benchmark 0-100%
Just-in-time VM access (reduces attack surface)
Defender CSPM (free tier) covers basic posture
Polygraph-based anomaly detection for cloud environments. Builds behavioural baselines and alerts on deviations — accounts, processes, file changes, network connections. Excellent for detecting novel attacks that signature tools miss.
Polygraph: maps normal behaviour automatically
No rules to write — ML-based baselining
Composite alerts reduce alert fatigue
Open-source cloud security auditing tool supporting AWS, Azure, and GCP. Runs 400+ security checks against CIS Benchmarks, NIST, GDPR, HIPAA, PCI-DSS. CLI-based — ideal for quick posture assessment or CI/CD integration.
prowler aws --compliance cis_level2_aws_2.0.0
prowler azure --az-cli-auth -M html
prowler gcp --project-id myproject
Aqua Security's comprehensive vulnerability scanner for containers, Kubernetes, IaC (Terraform/CloudFormation/Helm), filesystems, and git repositories. The go-to shift-left tool for container security in CI/CD pipelines.
trivy image nginx:latest
trivy fs --scanners vuln,secret,misconfig ./
trivy k8s --report=summary cluster
CNCF runtime security engine for containers and Kubernetes. Detects anomalous behaviour in real time using kernel syscall tracing (eBPF). Rules detect shell spawned in container, privilege escalation, sensitive file reads, crypto mining, and more.
Terminal shell in container → alert
Write to /etc in running container → alert
Outbound connection to non-allowed IP → alert
Multi-cloud security auditing tool by NCC Group. Collects configuration data across AWS/Azure/GCP/OCI/Alibaba and presents a risk-scored HTML report with findings grouped by service and severity.
python scout.py aws --report-dir ./report
python scout.py azure --tenant-id <id>
python scout.py gcp --project <project>
AWS-native threat detection service. Analyses CloudTrail, VPC Flow Logs, DNS logs, and EKS audit logs using ML and threat intel. Detects crypto mining, credential compromise, C2 traffic, unusual API calls, and data exfiltration patterns.
UnauthorizedAccess:EC2/SSHBruteForce
Backdoor:EC2/C&CActivity.B!DNS
Exfiltration:S3/MaliciousIPCaller.Custom
Infrastructure-as-Code (IaC) static analysis tool. Scans Terraform, CloudFormation, Kubernetes YAML, ARM templates, Dockerfile, and Helm charts for security misconfigurations before deployment. 2000+ built-in checks.
checkov -d ./terraform --output json
checkov -f kubernetes-deployment.yaml
checkov --framework dockerfile -f Dockerfile
Open-source Security Incident Response Platform (SIRP). Case management, task assignment, observables tracking, and timeline reconstruction. Integrates with MISP for threat intelligence and Cortex for automated analysis. GDPR-compliant evidence handling.
Cases → Tasks → Observables → Reports
MISP integration: import IoCs as observables
Cortex: automated enrichment (VirusTotal, etc.)
SANS Institute's free DFIR workstation — an Ubuntu VM pre-loaded with 200+ forensic tools. Volatility, Autopsy, Plaso, log2timeline, bulk_extractor, Rekall, and more. The standard reference environment for digital forensics and incident response.
Volatility 3 · Plaso · log2timeline
Autopsy · Sleuth Kit · bulk_extractor
RegRipper · EVTXtract · Chainsaw
Malware Information Sharing Platform — the open standard for threat intelligence sharing. Stores, correlates, and distributes IoCs (IPs, domains, hashes, CVEs). Syncs with global threat intel communities. Integrates with TheHive, Splunk, and SIEM tools.
STIX 2.0 / TAXII 2.x support
REST API: push/pull IoC feeds
PyMISP: Python library for automation
Network forensics analysis tool that reconstructs application data (emails, HTTP sessions, VoIP calls, FTP transfers) from pcap files. Web-based GUI. Useful for reconstructing what happened during an incident from network captures.
HTTP sessions (URLs, cookies, POST data)
Emails from SMTP/IMAP/POP3 streams
VoIP calls from RTP streams → audio files
Advanced digital forensics and incident response platform. Deploys agents to endpoints for live forensics, threat hunting, and evidence collection at scale. Uses VQL (Velociraptor Query Language) for custom hunts. Rapidly triage thousands of endpoints simultaneously.
SELECT * FROM pslist() WHERE Exe =~ "suspicious"
SELECT * FROM yara_scan_proc() WHERE Rule
Hunt: collect artifacts from 10,000 endpoints
Palo Alto's SOAR platform — automates incident response via playbooks. 900+ integrations with SIEM, EDR, ticketing, and threat intel tools. Warroom collaboration, automated triage, and case management. Reduces MTTR from hours to minutes.
Phishing triage: extract IoCs → check VT → block
Alert enrichment: IP/domain → geo/ASN/reputation
Automated containment via EDR playbook
GCHQ's "cyber Swiss Army knife" — browser-based tool for encoding/decoding, encryption, compression, data analysis, and format conversion. 400+ operations chainable via drag-and-drop. Essential for malware analysis and CTF challenges.
Base64 Decode → Gunzip → Extract URLs
From Hex → XOR (key) → From Base64
Magic: auto-detect and decode unknown data
Creates forensic super-timelines from disk images, filesystem artefacts, browser history, registry hives, event logs, and more. Produces a single CSV timeline of all artefact timestamps for incident reconstruction. Used in SANS FOR508.
log2timeline.py --storage-file out.plaso image.dd
psort.py -o l2tcsv out.plaso > timeline.csv
pinfo.py out.plaso # storage stats
The market-leading SIEM and log analytics platform. Indexes machine data at scale, enables ad-hoc search with SPL (Search Processing Language), and builds dashboards, alerts, and correlation rules. Splunk ES adds security analytics on top.
index=windows EventCode=4625 | stats count by src_ip
index=proxy | rex "(?P<domain>[^/]+)" | rare domain
| tstats summariesonly=t count WHERE index=* BY _time
Cloud-native SIEM/SOAR on Azure. Uses KQL (Kusto Query Language) for analytics, built-in threat intelligence, UEBA, and automated playbooks via Azure Logic Apps. Pay-per-GB ingestion. 150+ connectors for Microsoft and third-party sources.
SecurityEvent | where EventID == 4625 | summarize count() by Account
SigninLogs | where ResultType == "50126"
ThreatIntelligenceIndicator | where Active == true
SIEM built on the Elastic Stack (Elasticsearch + Kibana). Free tier includes detection engine with MITRE ATT&CK-mapped prebuilt rules, timeline investigation, and case management. EQL (Event Query Language) for complex behavioural detections.
sequence by pid [process where name=="cmd.exe"] [network where true]
any where file.path : "C:\\Temp\\*.exe"
Open-source XDR and SIEM. Combines HIDS (host intrusion detection), log analysis, vulnerability detection, file integrity monitoring, and compliance (PCI-DSS, HIPAA, GDPR). Free alternative to commercial SIEMs for smaller organisations.
File Integrity Monitoring on critical paths
Rootkit detection · vulnerability scanner
Active response: auto-block on brute-force
Free open-source Linux distro bundling Suricata IDS, Zeek NSM, Elastic SIEM, TheHive, Fleet (osquery), and Kibana dashboards. Deploys as a full SOC platform. Used in university cybersecurity labs and SMB security teams worldwide.
Suricata IDS + Zeek NSM + osquery
Elasticsearch + Kibana + TheHive
so-allow / so-status management CLI
Enterprise SIEM with network flow analytics, log management, and behavioural analytics. Uses "Offenses" for prioritised incident management. Deep integration with IBM X-Force threat intelligence. QRadar SOAR adds automated playbooks.
Offenses = prioritised correlated incidents
AQL (Ariel Query Language) for custom searches
DSM Editor: custom log source parsing
Centralised log management with security analytics. Open-source core with commercial Operations tier. GELF format, pipeline processing rules, streams for real-time log routing. Lighter alternative to ELK for mid-size organisations.
source:firewall AND action:DENY
http_response_code:500 AND _exists_:user
Pipeline rule: parse CEF syslog → structured fields
Open-source Cyber Threat Intelligence platform using STIX 2.1 data model. Manages threat actors, campaigns, malware, indicators, TTPs, and relationships. Graph-based knowledge management. Integrates with MISP, TheHive, and SIEMs via connectors.
Entity types: Threat Actor, Campaign, Malware, IoC
Connectors: MISP, VirusTotal, AlienVault OTX
TAXII server: share intel with partners
OSINT and link analysis platform. Visually maps relationships between people, organisations, domains, IPs, emails, and social media via automated "transforms". Used for threat actor attribution, attack surface mapping, and fraud investigations.
Domain → IP → ASN → related domains
Email → leaked passwords → related accounts
Person → LinkedIn → employer → infrastructure
Search engine for internet-connected devices. Indexes banners from servers, cameras, industrial control systems, and IoT devices worldwide. Essential for attack surface management, finding exposed services, and threat actor infrastructure tracking.
org:"Acme Corp" port:22 country:US
product:"Hikvision IP Camera" vuln:CVE-2021-36260
shodan domain example.com # CLI
The pattern-matching tool for malware researchers. Write rules describing malware families by strings, byte patterns, or conditions. Scan files, memory, and processes. Used by every major threat intel team and AV vendor to detect and classify malware.
rule Ransomware { strings: $a = "YOUR FILES" condition: $a }
yara rules.yar /path/to/scan -r
yara rules.yar -p 4 suspicious_proc # process scan
Multi-AV scanner aggregating 70+ AV engine results for files, URLs, domains, and IPs. Community comments, behavioral analysis (sandbox), and relationship graphs between samples. Essential first-check for any suspicious file or indicator.
curl -X POST "https://www.virustotal.com/api/v3/files" --file
vt file <sha256> # CLI lookup
VT Graph: visualise relationships between IoCs
Generic SIEM detection rule format — write rules once, convert to Splunk SPL, KQL, EQL, QRadar AQL, etc. 3000+ community rules on GitHub covering MITRE ATT&CK TTPs. The Snort/YARA equivalent for log-based detection.
sigma convert -t splunk rule.yml
sigma convert -t microsoft365defender rule.yml
sigma convert -t elasticsearch-eql rule.yml
The leading memory forensics framework. Analyses RAM dumps from Windows, Linux, and macOS. Extracts processes, network connections, DLL injection evidence, registry hives, and passwords from memory. Critical for malware analysis and incident response.
vol -f mem.raw windows.pslist # process list
vol -f mem.raw windows.malfind # injected code
vol -f mem.raw windows.netscan # network conns
vol -f mem.raw windows.hashdump # NTLM hashes
GUI frontend for The Sleuth Kit disk forensics framework. Analyses disk images, filesystem artefacts, browser history, email, registry, and deleted files. Extensible with plugins. The go-to free forensic tool for Windows disk analysis in law enforcement and DFIR.
File System Analysis — MFT, deleted files
Keyword Search — across entire image
Timeline — all filesystem events chronologically
NSA's open-source reverse engineering suite. Disassembles, decompiles, and analyses binary code across x86, ARM, MIPS, and 50+ architectures. Script-extensible with Java/Python. The free alternative to IDA Pro — used by malware analysts worldwide.
Decompiler: ASM → pseudo-C code
GhidraScript: automate analysis with Python
Collaboration: shared project for team analysis
First-look malware analysis tool for Windows executables. Displays imports, exports, strings, entropy, VirusTotal results, and indicators of compromise — all statically without executing the file. Gold standard for initial malware triage.
Imports: suspicious API calls (CreateRemoteThread)
Strings: embedded URLs, IPs, registry keys
Entropy: >7.0 = likely packed/encrypted
Interactive online malware sandbox. Execute suspicious files/URLs in a real Windows VM and watch network activity, process tree, registry changes, and API calls in real time. Shareable reports. Free public submissions.
Process tree with injections highlighted
Network: DNS, HTTP, HTTPS, DNS-over-HTTPS
MITRE ATT&CK techniques auto-mapped
Firmware analysis and extraction tool. Identifies embedded file systems, compression formats, and executable code inside binary blobs. Essential for IoT/embedded device security research — extract squashfs, jffs2, and other filesystems from firmware images.
binwalk firmware.bin # identify signatures
binwalk -e firmware.bin # extract all
binwalk -A firmware.bin # find CPU arch
The leading ICS/OT threat detection and response platform. Understands industrial protocols (Modbus, DNP3, EtherNet/IP, BACnet, IEC 104). Identifies asset inventory, network segmentation gaps, and threat behaviour specific to ICS environments. Used in energy, water, manufacturing.
Protocol decoding: Modbus/DNP3/IEC104/BACnet
Activity Groups: named ICS threat actor tracking
WorldView: ICS-specific threat intelligence feed
Extended IoT (XIoT) security platform covering OT, IoT, IoMT (medical devices), and IT/OT convergence. Passive discovery of all connected assets, vulnerability management, network segmentation policy, and anomaly detection without disrupting operations.
Passive OT protocol dissection (no traffic injection)
CVE mapping to discovered OT asset versions
Segmentation assessment: IT/OT firewall gap analysis
OT and IoT security and visibility platform. Guardian sensor provides passive network monitoring of industrial and IoT environments. AI-powered anomaly detection learns normal OT behaviour. Vantage cloud management provides enterprise-wide OT visibility.
AI baseline: learns normal Modbus setpoint ranges
Remote access monitoring: Purdue Model visibility
Threat intel: industrial malware IoC integration
Full-featured vulnerability scanner — the open-source alternative to Nessus. Daily updated NVT (Network Vulnerability Tests) feed covering 80,000+ CVEs. Scans network devices, servers, and OT equipment. Greenbone Community Edition is free; Enterprise adds compliance reports.
docker run -d -p 9392:9392 greenbone/community-edition
GVM CLI: gvm-cli socket --gmp-username admin
80,000+ NVTs updated daily from Greenbone feed
Converged IT/OT vulnerability management. Passively discovers all OT assets and maps CVEs to specific firmware versions. Integrates with Tenable.sc for unified IT+OT risk view. Detects Modbus/DNP3 anomalies and known ICS attack patterns.
Passive asset discovery — no scanning impact on OT
CVE mapping to PLC firmware versions
Unified risk score: IT + OT assets in one dashboard
Post-binwalk firmware filesystem analysis script. Hunts extracted firmware for hardcoded passwords, private keys, SSL certificates, email addresses, IP addresses, and common IoT backdoor patterns. Fast automated triage of IoT firmware security.
./firmwalker.sh /extracted/firmware/
Hunts: /etc/passwd · /etc/shadow · *.pem · *.key
Finds: hardcoded IPs, telnet/SSH backdoors
Agentless IoT/OT device security platform. Discovers and classifies every connected device (managed, unmanaged, IoT, OT, IoMT) without requiring agents or network changes. 500M+ device behaviour profiles for anomaly detection. Used in healthcare, manufacturing, and enterprise.
Passive device discovery — no agents required
500M+ device knowledge base for classification
Automated quarantine via NAC integration
Nmap NSE scripts and standalone tools for scanning ICS/SCADA devices. Redpoint identifies Modbus, BACnet, EtherNet/IP, DNP3, and Siemens S7 devices. PLCScan identifies specific PLC models and firmware. Essential for ICS penetration testing and asset discovery.
nmap --script modbus-discover -p 502 target
nmap --script bacnet-info -p 47808 -sU target
nmap --script s7-info -p 102 target (Siemens S7)