I find such lists nigh unto useless. I don't have time to evaluate each project to see which one is the right fit for my needs.
We'd be better off if people did a deep dive analysis of just one of those categories.
I suspect that whoever constructs these types of lists does NOT have experience with each project, and thus there's bound to be plenty of projects that don't deserve to be on the list because they're just not ready for production usage.
strg+f Wireguard: 0/0
I guess maintaining recommendation lists is hard.I try to do something similar with Threat Intel / OSINT tooling at http://www.threat-intel.xyz. List gets regular updated and curated by hand.
This has the lowest signal to noise ratio of any of these lists of I've seen so far. That entire project management section should go. The entire section on configuration management should go. There are probably some good tools here but I'm not going to click on each and every one just in case it's something more interesting than Trello.
Yesterday I needed a regex fuzzer but couldn't find any (except some Windows SDL whatever that means, I'm not developing on Windows) In the end I just created a very limited whitelist of input characters allowed and didn't use a "security tool"
> open source
First tool: Trello
Hmm okay
Cool list! Gives general ideas on what to take into account when dealing with security
Curious to see the pfSense firewall appliance OS filed under "Anti-Virus"
That’s one badly formatted list.
A lot of these "awesome" lists are maybe reasonably OK on first-publish, but ultimately become useless due to:
1. Lack of curation (focus on including everything rather than being opinionated)
2. Lack of updates (tools get out of date fast, especially in long lists that try and include everything).
However, THIS list is different. This list is BAD on first publish. Most of the categories are not even remotely security related ("Project Management") or at least not explicitly so ("Supply Chain Management" / "Docker UI" / "Configuration Management"). Yeah sure, some of the latter will be useful for blue teams, but noone on any blue team is going to be searching for those tools under the keyword "security".
Beyond the above, things get worse: the formatting is hopeless, many of the tools are not open-source at all, and while including a lot of irrelevant non-security-related stuff, it omits many obvious well-known security tools.
Flagged for marketing this as "Open source"