Truvis / CheatSheetsLinks
Collection of scripts, files, and tips to create and maintain networks, hack, and more!
☆75Updated 4 years ago
Alternatives and similar repositories for CheatSheets
Users that are interested in CheatSheets are comparing it to the libraries listed below
Sorting:
- Ansible Playbooks for SimeonOnSecurity's STIG Scripts☆15Updated last year
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Updated 10 months ago
- ☆53Updated this week
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66Updated 5 years ago
- Useful scripts for those administering Wazuh☆91Updated last month
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- ☆20Updated 3 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆51Updated 4 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆32Updated 9 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆13Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆54Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 months ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 4 years ago
- A curated list of awesome threat detection and hunting resources☆20Updated 6 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆24Updated 9 years ago
- Ansible Playbook to install the ELK Stack☆44Updated 5 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆49Updated 2 months ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Updated 3 years ago
- This is the network diagrams, configuration guides, and hardware used for my home lab.☆83Updated 7 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated last month
- CSI SIEM☆109Updated 3 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated last year
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆27Updated 6 years ago
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆38Updated last year
- Wazuh - Chef cookbooks☆24Updated 2 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Updated last year