From time to time, we develop software, scripts and guides to help with our day to day computer usage, as part of personal projects or during security competitions.
In this section we will be offering, free of charge (and thus with limited support), the different programs and scripts we believe could be useful for the wider Security/Open Source community.
GITHUB
FREE RESOURCES FROM ELYSIUMSECURITY
Please note we are progressively moving this section of the website to GITHUB, where all our free resources will eventually be hosted.
At the moment there are 2x projects available on our Github page:
  • The BUGS project
  • The Incident Playbook project (not available here)
  • The other documents currently available below will be migrated at a later date.
    GO TO OUR GITHUB PAGE

    SOFTWARE
    BUGS CRYPTOGRAPHY
    Various applications and cryptography libraries for Unix/Mac and Windows
    2010 - 2015
    UNIX, MAC, WINDOWS
    See CRYPTO SECTION

    SCRIPTS
    Pineapple MarkV Plugin - DNSCHANGER
    A plugin available on the pineapplebar directly from your pineapple device.
    This can be used to change your pineapple DNS settings
    January 2015
    UNIX
    dnschanger-1.2.tar.gz
    Backup Sync
    A script to backup specific folders into external hardrive with the ability to blacklist folders/files through keywords. Very fast, can be customised.
    December 2014
    UNIX, MAC
    backup_sync.1.2.sh
    PocketRC4.sh
    This is a script implementing the PocketRC4 algorithm in Shell script. Please note you need at least Bash version 4.2 for this to work (this is because of one of the first line using "Declare", so this may not work on MAC OS X). More information can be found HERE
    May 2015
    UNIX
    pocketrc4_v5.sh

    GUIDES
    Security Onion Guide
    How to setup Security Onion on a home network with Splunk, email alerts and some basic tuning.
    May 2015
    PDF
    esguide_so_v4.pdf

    PRESENTATIONS
    PROGRAMMING AND CYBER SECURITY
    An overview of why knowing programming can make you a better cyber security professional, a look at the most popular languages and some pitfalls to avoid.
    SEPTEMBER 2021
    PDF
    DOWNLOAD
    INTRODUCTION TO CRYPTOGRAPHY
    An overview of what is cryptography, its main algorithms and usage.
    SEPTEMBER 2019
    PDF
    DOWNLOAD
    INCIDENT RESPONSE NIST IMPLEMENTATION
    A pratical way to implement the NIST Incident Response framework.
    AUGUST 2019
    PDF
    DOWNLOAD
    DATA LOSS PREVENTION OVERVIEW
    This presentation looks at how to implement a data loss prevention (DLP) successfully.
    JULY 2019
    PDF
    DOWNLOAD
    2019 SECURITY TRENDS REPORTS OVERVIEW
    This presentation provides an overview of the top 10 security trends reports of 2019.
    JULY 2019
    PDF
    DOWNLOAD
    PHISHING PROTECTION
    This presentation provides some practical information on fighting phishing attacks.
    JUNE 2019
    PDF
    DOWNLOAD
    INCIDENT RESPONSE
    This presentation provides an overview on how to start your incident response plan.
    JUNE 2019
    PDF
    DOWNLOAD
    VIRTUAL CISO AND CYBER ROLES
    A look at what is a Virtual CISO and which cyber security roles you may want to consider setting up in your organisation.
    APRIL 2019
    PDF
    DOWNLOAD
    OFFENSIVE IDS
    IDS are great tools for blue teams and resource for network forensics, however they can also be a great resource for the red teams and as part of a penetration testing exercise.
    FEBRUARY 2019
    PDF
    DOWNLOAD
    IOT SECURITY
    A look at the main security risks and impact related to IOT devices as well as what are the key steps to improve IOT security.
    OCTOBER 2018
    PDF
    DOWNLOAD
    ARE YOU RED TEAM READY?
    A look at what makes a Red Team special versus more traditional security services such as Vulnerability Assessment and Penetration Testing.
    SEPTEMBER 2018
    PDF
    DOWNLOAD
    MOBILE SECURITY ASSESSMENT
    Presenting an established assessment framework for mobile application and introducing some common tools to get started.
    AUGUST 2018
    PDF
    DOWNLOAD
    THE ART OF CTF
    Introducing the concept of Capture the Flag and the free training benefits of participating at one.
    AUGUST 2018
    PDF
    DOWNLOAD
    OFFICE 365 SECURITY
    A look at the hidden security features of Office 365 as well as best practices to secure it.
    JULY 2018
    PDF
    DOWNLOAD
    DATA PROTECTION
    A look at how to protect your data and why it is important.
    JUNE 2018
    PDF
    DOWNLOAD
    INTRODUCTION TO CYBER FORENSICS
    Looking at the different steps involved in Cyber Forensics and an overall framework to guide you through.
    MAY 2018
    PDF
    DOWNLOAD
    CYBER MEDIA AS A CYBER WEAPON
    A look at how much data can easily be gathered from social media and how it can be applied as part of a cyber attack.
    APRIL 2018
    PDF
    DOWNLOAD
    HOW TO SETUP A HOME IDS
    An overview of what an IDS is and how to get started to set one up at home.
    MARCH 2018
    PDF
    DOWNLOAD
    STANDARDS AND REGULATIONS
    A quick introduction to ISO 27001, 27002, FFIEC, GDPR and Mauritius DPA 2017.
    MARCH 2018
    PDF
    DOWNLOAD
    WIFI SECURITY EXPOSED
    Overview on the state of WIFI security for WEP, WPA/WPA2, WPA3. Looking at their protocols, weaknesses and attacks.
    The presentation finishes with a live demo on 2 attacks: Karma Attack and Evil Portal Attack
    FEBRUARY 2018
    PDF
    DOWNLOAD
    OPEN SOURCE IDS
    What is an IDS? What is required for a successful implementation and utilisation? IDS can also be used for penetration testing activities, not just for defence purposes. See how!
    This was presented as part of the FIRST Technical Colloquium 2017 Conference in Mauritius on the 30th of November 2017.
    NOVEMBER 2017
    PDF
    DOWNLOAD