Truvis / CheatSheetsLinks
Collection of scripts, files, and tips to create and maintain networks, hack, and more!
☆73Updated 4 years ago
Alternatives and similar repositories for CheatSheets
Users that are interested in CheatSheets are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆99Updated last year
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆53Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆19Updated 6 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆33Updated 9 years ago
- Ansible Playbooks for SimeonOnSecurity's STIG Scripts☆14Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆63Updated 5 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated last year
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆10Updated last year
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 2 weeks ago
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 4 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆19Updated 4 months ago
- ☆48Updated last week
- ☆17Updated 3 years ago
- ☆17Updated 2 years ago
- Official documentation for TheHive Project applications☆21Updated last year
- A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benc…☆35Updated 3 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- Kaseya REvil CNC domains☆12Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 5 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆42Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆55Updated 2 years ago
- Collection of Dashboards for Threat Hunting and more!☆68Updated 4 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- CSI SIEM☆110Updated 2 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆61Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago