Cloud-based Cybersecurity Products Implementation Solutions
A comprehensive CLI framework for deploying, configuring, and managing enterprise cybersecurity tools across multiple domains including SOC/SIEM, EDR/XDR, Network Security, Application Security, Cloud Security, and more.
- Multi-Domain Support: SOC, EDR, Network, Application, Cloud, VM, AI Security
- Cloud-Native: Deploy to AWS, Azure, GCP, Kubernetes, or Docker
- Attack Simulation: Built-in MITRE ATT&CK scenarios for detection testing
- Professional Reports: Generate executive and technical security reports
- Extensible Architecture: Easy to add new tools and modules
- Open Source First: Prioritizes open-source alternatives alongside enterprise tools
# Clone repository
git clone https://github.com/imharshitaa/toolkit.git
cd toolkit
# Create virtual environment
python3 -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install dependencies
pip install -r requirements.txt
# Install ToolKit CLI
pip install -e .
# Verify installation
toolkit --version
# Deploy your first tool (Splunk via Docker)
toolkit deploy soc splunk --environment docker
# Access Splunk Web UI at http://localhost:8000
# Default credentials: admin / changeme- Python 3.8 or higher
- Docker (for containerized deployments)
- AWS CLI (for AWS deployments)
- kubectl (for Kubernetes deployments)
- Terraform (for infrastructure as code)
git clone https://github.com/imharshitaa/toolkit.git
cd toolkit
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
pip install -e .pip install toolkit-cybersec| Tool | Type | Description |
|---|---|---|
| Splunk | Enterprise | Leading SIEM platform |
| Microsoft Sentinel | Cloud | Cloud-native SIEM |
| IBM QRadar | Enterprise | Security analytics platform |
| Elastic | Open Source | Elasticsearch-based SIEM |
| Wazuh | Open Source | Open source security monitoring |
| Tool | Type | Description |
|---|---|---|
| CrowdStrike Falcon | Enterprise | Cloud-native endpoint protection |
| SentinelOne | Enterprise | AI-powered endpoint security |
| Microsoft Defender | Enterprise | Endpoint detection and response |
| Wazuh | Open Source | Open source EDR solution |
| Tool | Type | Description |
|---|---|---|
| Palo Alto | Enterprise | Next-generation firewall |
| Fortinet | Enterprise | FortiGate security appliance |
| Cisco Secure | Enterprise | Network security solutions |
| OPNsense | Open Source | Open source firewall |
| pfSense | Open Source | FreeBSD-based firewall |
| Tool | Type | Description |
|---|---|---|
| Burp Suite | Enterprise | Web application security testing |
| OWASP ZAP | Open Source | Penetration testing tool |
| Nuclei | Open Source | Vulnerability scanner |
| Postman | Tool | API security testing |
| Tool | Type | Description |
|---|---|---|
| AWS GuardDuty | Cloud | AWS threat detection |
| Security Hub | Cloud | AWS security posture management |
| Prisma Cloud | Enterprise | Palo Alto cloud security |
| Mandiant | Enterprise | Google Cloud security |
| Tool | Type | Description |
|---|---|---|
| Tenable Nessus | Enterprise | Vulnerability scanner |
| Qualys | Enterprise | Cloud-based VM platform |
| Rapid7 | Enterprise | Nexpose vulnerability management |
| OpenVAS | Open Source | Open source scanner |
# Check system status and dependencies
toolkit status
# List available tools for a module
toolkit list-tools soc
toolkit list-tools edr
toolkit list-tools appsec
# Get help for any command
toolkit --help
toolkit deploy --help
toolkit scan --helptoolkit deploy soc splunk --environment dockertoolkit deploy soc splunk \
--environment aws \
--region us-east-1 \
--instance-type t3.xlargetoolkit deploy edr wazuh --environment kubernetestoolkit deploy soc splunk \
--config-file ./configs/splunk-prod.yaml \
--environment aws \
--auto-approvetoolkit scan appsec zap \
--target https://example.com \
--scan-type full \
--output results.jsontoolkit scan vm tenable \
--target 192.168.1.0/24 \
--scan-type compliance \
--format html# Simulate MITRE ATT&CK techniques
toolkit scan soc splunk \
--target localhost:8088 \
--simulate \
--scenario brute_force# Generate PDF security report
toolkit report soc splunk \
--format pdf \
--template executive
# Generate technical report with screenshots
toolkit report appsec zap \
--format html \
--template technical \
--include-screenshots
# Generate compliance report
toolkit report vm tenable \
--format docx \
--compliance-framework nist \
--severity-filter critical# Open tool dashboard in browser
toolkit open soc splunk
toolkit open appsec zap
toolkit open cloudsec guardduty
# Print URL instead of opening browser
toolkit open soc splunk --print-url
# Connect to custom host
toolkit open soc splunk --host 192.168.1.10 --port 8000toolkit/
β
βββ toolkit/ # Core CLI engine
β βββ cli.py # Main CLI entry point
β βββ core.py # Execution engine
β βββ deploy.py # Deployment logic
β βββ scan.py # Scanning logic
β βββ report.py # Report generation
β βββ open_dashboard.py # Dashboard opener
β βββ utils.py # Helper functions
β
βββ modules/ # Security domain modules
β βββ SOC/ # SIEM tools
β β βββ splunk/
β β β βββ config.py # Configuration
β β β βββ deploy.py # Deployment logic
β β β βββ simulate.py # Attack simulation
β β β βββ detections.md # Detection rules
β β β βββ README.md # Documentation
β β βββ qradar/
β β βββ elastic/
β β
β βββ APPSEC/ # Application security
β βββ CLOUDSEC/ # Cloud security
β βββ NETSEC/ # Network security
β βββ EDR/ # Endpoint detection
β βββ VM/ # Vulnerability management
β βββ AISEC/ # AI-powered security
β
βββ labs/ # Lab environments
βββ docker/ # Docker Compose setups
βββ terraform/ # IaC templates
βββ k8s/ # Kubernetes manifests
Each security tool follows a consistent structure:
tool_name/
βββ config.py # Tool configuration
βββ deploy.py # Deployment implementation
βββ simulate.py # Attack/test simulation (optional)
βββ detections.md # Detection rules (SIEM/EDR)
βββ README.md # Tool-specific documentation
cd labs/docker
docker-compose up -d
# Access services:
# Splunk: http://localhost:8000
# ZAP: http://localhost:8080
# Wazuh: http://localhost:5601
# Kibana: http://localhost:5602cd labs/terraform
terraform init
terraform plan
terraform apply
# Outputs will show:
# - Splunk public IP
# - GuardDuty detector ID
# - CloudTrail ARNThe toolkit includes built-in attack simulations based on MITRE ATT&CK:
# Brute force attack (T1110)
toolkit scan soc splunk --simulate --scenario brute_force
# Lateral movement (T1021)
toolkit scan soc splunk --simulate --scenario lateral_movement
# Data exfiltration (T1048)
toolkit scan soc splunk --simulate --scenario data_exfiltration# Clone repository
git clone https://github.com/imharshitaa/toolkit.git
cd toolkit
# Create virtual environment
python3 -m venv venv
source venv/bin/activate
# Install in development mode
pip install -e ".[dev]"
# Install pre-commit hooks
pre-commit install# Run all tests
pytest
# Run with coverage
pytest --cov=toolkit --cov-report=html
# Run specific test file
pytest tests/test_cli.py -v
# Run tests for a specific module
pytest tests/test_cli.py::TestCLI::test_version_command# Format code
black toolkit/ modules/ tests/
# Lint code
flake8 toolkit/ modules/ tests/
# Type checking
mypy toolkit/
# Security scan
bandit -r toolkit/- Create module directory:
mkdir -p modules/MODULE_NAME/tool_name- Create required files:
touch modules/MODULE_NAME/tool_name/config.py
touch modules/MODULE_NAME/tool_name/deploy.py
touch modules/MODULE_NAME/tool_name/README.md- Implement
config.py:
def get_config(environment: str = 'docker') -> dict:
return {
'tool_config': {...},
'deployment': {...}
}
def validate() -> bool:
# Validation logic
return True- Implement
deploy.py:
def execute(**kwargs) -> bool:
# Deployment logic
return True-
Add tool to
core.pyinget_available_tools()function -
Test your implementation:
toolkit deploy module_name tool_name --dry-run- Splunk Module Documentation
- ZAP Module Documentation
- Detection Rules
- Architecture Overview
- API Reference
- π Report bugs and issues
- π‘ Suggest new features
- π Improve documentation
- π§ Add new tool modules
- β Write tests
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Make your changes
- Run tests (
pytest) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
- MITRE ATT&CK Framework
- OWASP Foundation
- Splunk Community
- All open-source security tool maintainers
- Issues: GitHub Issues
- Docs: [Documentation - wip]
- Add support for more SIEM platforms (Sumo Logic, LogRhythm)
- Implement SOAR integration (Tines, Shuffle, Phantom)
- Add compliance frameworks (SOC 2, PCI-DSS, HIPAA)
- Create web UI dashboard
- Add API for programmatic access
- Implement machine learning-based threat detection
- Support for hybrid cloud deployments
- Integration with threat intelligence feeds
Made by imharshitaa
β Star on GitHub if you find this project useful!