Jan. 31, 2023, 11:25 p.m. | /u/Robbbbbbbbb

For [Blue|Purple] Teams in Cyber Defence www.reddit.com

We're a month into 2023 and I'm finding myself re-evaluating what tools me and my team use on the job. Just wondering what everyone is still using on a regular basis for internal work, or as an MSSP for clients.

Some of my random picks:

* [Nessus](https://www.tenable.com/products/nessus) \- Vulnerability scanning
* Alternatively, [OpenVAS](https://www.openvas.org/)
* [Zeek](https://zeek.org/)/[RITA](https://www.blackhillsinfosec.com/projects/rita/) \- C2 beacon detection
* [Loki](https://github.com/Neo23x0/Loki) \- YARA/IOC scanner
* [Bloodhound](https://github.com/BloodHoundAD/BloodHound) \- AD attack path management/enumeration
* [Volatility](https://www.volatilityfoundation.org/) \- Memory forensics
* [DeepBlueCLI](https://github.com/sans-blue-team/DeepBlueCLI) \- Event …

blueteamsec clients internal job mssp random team tools work

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Oracle EBS DevSecOps Developer

@ Accenture Federal Services | Arlington, VA

Information Security GRC Specialist - Risk Program Lead

@ Western Digital | Irvine, CA, United States

Senior Cyber Operations Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

AI Cybersecurity Architect

@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)