Cybersecurity News

Turnkey GNU/Linux

Turnkey GNU/Linux v15.0 released

Turnkey GNU/Linux is a free Debian based library of system images that pre-integrates and polishes the best free software components into secure, easy to use solutions. TurnKey is inspired by a belief in the democratizing power of free...

Ypsilon

ypsilon: Automated Use Case Testing

ypsilon Automated Use Case Testing Ypsilon is an Automated Security Use Case Testing Environment using real malware to test SIEM use cases in a closed environment. Different tools such as Ansible, Cuckoo, VirtualBox, Splunk, and ELK are combined to determine...

CAPE

Mystique: vaccinate endpoints against malware

Mystique Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malicious sample and automatically generates a list of mutexes that could...

Intrusion Detection Dataset Toolkit

ID2T-toolkit: Intrusion Detection Dasaset Toolkit

ID2T – Intrusion Detection Dataset Toolkit A toolkit for injecting synthetic attacks into PCAP files. As Intrusion Detection Systems encounter growing importance in the area of network security, the need for high-quality network datasets...

uDdbg

uDdbg: Unicorn DOPE Debugger

uDdbg – Unicorn DOPE Debugger A gdb-like debugger that provides a runtime env to unicorn emulator and additionals features! Unicorn DOPE Debugger (uDdbg) is a tool that extends the functionality of the epic Unicorn...