Truvis / CheatSheetsLinks
Collection of scripts, files, and tips to create and maintain networks, hack, and more!
☆75Updated 4 years ago
Alternatives and similar repositories for CheatSheets
Users that are interested in CheatSheets are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- ☆53Updated last week
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Updated 10 months ago
- Useful scripts for those administering Wazuh☆90Updated 2 weeks ago
- ☆20Updated 3 years ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66Updated 5 years ago
- Ansible Playbooks for SimeonOnSecurity's STIG Scripts☆15Updated last year
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Updated 3 years ago
- CSI SIEM☆109Updated 3 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆51Updated 4 months ago
- A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benc…☆37Updated 3 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆32Updated 9 years ago
- ☆22Updated 3 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆18Updated 3 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆52Updated 4 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆48Updated last month
- Tools to integrate 2 great security tools OPNsense and Wazuh☆31Updated 4 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated last month
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated last year
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Wazuh - Chef cookbooks☆24Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆56Updated 3 years ago
- Kaseya REvil CNC domains☆12Updated last year
- Collection of Dashboards for Threat Hunting and more!☆71Updated 5 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆60Updated 3 years ago
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 5 years ago
- ☆18Updated 4 years ago