Irish Information Security Forum

Maximize Resilience to a Cyber Incident


ServiceSkill Level

Metta Basic Uber-Common Leverages the MITRE-ATT&CK Framework: An information security preparedness tool. This project uses Redis/Celery, Python, and vagrant with VirtualBox to do adversarial simulation.

GitHub - uber-common/metta: An information security preparedness tool to do adversarial simulation.
Sandbox Scryer Basic Hybrid-Analysis Leverages the MITRE-ATT&CK Framework: An open-source tool for producing threat hunting and intelligence data from public sandbox detonation output. The tool can organize and prioritize findings, assisting in assembling IOCs, understanding attack movement and hunting threats.

GitHub - PayloadSecurity/Sandbox_Scryer
Forest Druid Basic Semperis An attack path discovery tool that helps cybersecurity defensive teams prioritize high-risk misconfigurations that could represent opportunities for attackers to gain privileged domain access.

Forest Druid - Focus on your Tier 0 perimeter (purple-knight.com)
John the Ripper Password Cracker Basic OpenWall This offering is a password security auditing and password recovery tool available for many operating systems. John the Ripper jumbo supports hundreds of hash and cipher types, including for: user passwords of Unix flavors, macOS, Windows, groupware, and database servers; network traffic captures; encrypted private keys, filesystems and disks, archives, and document files.

John the Ripper password cracker (openwall.com)
Trusona 2-Step Verification with TOTP Basic  Trusona This free mobile app can be used with any 3rd party service that offers 2-step verification with a 6-digit TOTP code. App users will need to input its their username and password for the 3rd party service they would like to access.

Trusona 2-Step Verification with TOTP | Trusona Docs
Microsoft Security Compliance Toolkit 1.0 Basic Microsoft This toolset allows enterprise security administrators to download, analyze, test, edit and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products, while comparing them against other security configurations. 

Download Microsoft Security Compliance Toolkit 1.0 from Official Microsoft Download Center
Authentication Tool Advanced Trusona A passwordless authentication for WordPress admins that enhances security & usability.

Trusona for WordPress – WordPress plugin | WordPress.org
HYPR Zero Advanced HYPR True Passwordless(™) MFA platform HYPR Zero is designed for smaller organizations and delivers passwordless multi-factor authentication.

True Passwordless MFA for Small Business Pricing | HYPR
Windows Auto-Backup Basic Microsoft This tool sets up automatic backups of Windows 10 and 11 operating systems. https://support.microsoft.com/en-us/windows/backup-and-restore-in-windows-352091d2-bb9d-3ea3-ed18-52ef2b88cbef

Google Backup & Sync Basic Google This tool backs up files on Windows or Mac computers. Note: it does not allow users to restore their system; it only saves copies of files.

Microsoft Threat Modeling Tool Advanced Microsoft This tool is designed to make threat modeling easier for developers through a standard notation for visualizing system components, data flows, and security boundaries.

Microsoft SecCon Framework Advanced Microsoft This framework is designed to help prioritize endpoint hardening recommendations. https://github.com/microsoft/SecCon-Framework


If you are interested in finding out more about the IISF, or would like to attend one of our Chapter Meetings as an invited guest, please contact the
IISF Secretary:

By email:

By post:

David Cahill

Information Security

GPO, 1-117
D01 F5P2

Enhance your Cybersecurity knowledge and learn from those at the coalface of information Security in Ireland



We would like to thank these generous sponsors for their support. 

crowdstrike logo

zscaler logo



Sponsors are featured prominently throughout the IISF.IE website, social media channels as well as enjoying other benefits Read more


secured by edgescan digital security radar logo

© iiSf. All rights reserved. CRN: 3400036GH  - Privacy Statement  - Sponsorship  - Cybersecurity News Topics  - Cybersecurity Resources  - Produced by
LinkedIn Twitter