Сybersecurity. Open Source Solutions

Cybersecurity is protection against attacks occurring through network access, injection of data or code, and control of physical access to equipment.

Vulnerability Scanning & Penetration Testing. IT Security Audit.

Computer security, cybersecurity, digital security or information technology security (IT security) is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
Cybersecurity (computer security) is a set of methods and practices for protecting computers, servers, mobile devices, electronic systems, networks and data from attacks by intruders.


Cybersecurity – Overview

Components of Cybersecurity

Legislation. Сybersecurity


Recommendations.
If any of the solutions interests you, or you think that it has a good perspective for development, or you can adapt the software to the needs of citizens, authorities, businesses or NGO-s in Moldova, then you can:


1. International Solutions

# Open Source Solution Web Licence
1 Google / OSV-Scanner
Use OSV-Scanner to find existing vulnerabilities affecting your project’s dependencies.
OSV-Scanner provides an officially supported frontend to the OSV database that connects a project’s list of dependencies with the vulnerabilities that affect them. Since the OSV.dev database is open source and distributed, it has several benefits in comparison with closed source advisory databases and scanners.
google.github.io/osv-scanner BSD-3
2 18F / development-guide
A set of guidelines and best practices for an awesome software engineering team.
Technology Transformation Services (TTS) Engineering Practices.
TTS offices and programs — including 18F, Centers of Excellence (CoE), Presidential Innovation Fellows (PIF), and Solutions — promote team best practices across specialty areas through guilds. These guilds support their members in whatever way deemed most appropriate by those members themselves.
This repo is where the TTS Engineering Practices Guild keeps its guide to best practices and resources for software development. Documentation is written using Markdown syntax and published as HTML using the Jekyll static site generator.
engineering.18f.gov CC0-1.0
3 cisagov / development-guide
Cybersecurity and Infrastructure Security Agency. Commit today, secure tomorrow.
A set of guidelines and best practices for an awesome engineering team.
Heavily “inspired” by the 18F Development Guide.
no website CC0-1.0
4 Hack-with-Github / Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers.
no website CC0-1.0
5 sqlmapproject / sqlmap
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.
sqlmap.org GNU
6 sullo / nikto
Nikto web server scanner.
cirt.net/Nikto2 GPL-2.0
7 aquasecurity / cloudsploit
CloudSploit by Aqua – Cloud Security Scans.
CloudSploit by Aqua is an open-source project designed to allow detection of security risks in cloud infrastructure accounts, including: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Oracle Cloud Infrastructure (OCI), and GitHub. These scripts are designed to return a series of potential misconfigurations and security risks.
aquasec.com GPL-3.0
8 OWASP / Nettacker
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information.
owasp.org/www-project-nettacker Apache-2.0
9 OWASP / www-project-zap
OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. Great for pentesters, devs, QA, and CI/CD integration.
owasp.org/www-project-zap Apache-2.0
10 greenbone / openvas-scanner
This repository contains the scanner component for Greenbone Community Edition.
greenbone.github.io/…/openvas-scanner GPL-2.0
11 OpenSCAP / openscap
Open Source Security Compliance Solution.
The oscap program is a command line tool that allows users to load, scan, validate, edit, and export SCAP documents.
open-scap.org/tools/openscap-base LGPL-2.1
12 wapiti-scanner / wapiti
Web vulnerability scanner written in Python3.
wapiti-scanner.github.io GPL-2.0

2. Outdated solutions

The Open Source Solutions that does not update more than 1 year, but potentially could be interesting to End Users.
We don’t make any recommendations to use or not to use the solutions listed below. Your decision is fully up to you.

# Open Source Solution Web Licence
1 craigz28 / firmwalker
A simple bash script for searching the extracted or mounted firmware file system.
It will search through the extracted or mounted firmware file system for things of interest.
No website GPL-3.0