Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
☆1,059Jun 27, 2025Updated 9 months ago
Alternatives and similar repositories for Open-Source-Security-Guide
Users that are interested in Open-Source-Security-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆2,507Jan 4, 2024Updated 2 years ago
- A collection of awesome security hardening guides, tools and other resources☆6,256Mar 20, 2026Updated 3 weeks ago
- IntelOwl: manage your Threat Intelligence at scale☆4,534Updated this week
- A Networking Guide for getting started with basic/core network components such as wired and wireless network design, configuration, hard…☆98Jan 24, 2022Updated 4 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,223Jul 15, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,549Jan 5, 2026Updated 3 months ago
- A curated list of tools for incident response☆8,931Jul 18, 2024Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆618Dec 8, 2025Updated 4 months ago
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,686Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,551Jul 28, 2024Updated last year
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,296Updated this week
- A curated list of Awesome Threat Intelligence resources☆10,041Jan 19, 2026Updated 2 months ago
- Tools and Techniques for Blue Team / Incident Response☆3,994Mar 27, 2025Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,039Dec 21, 2024Updated last year
- Daily alert when a new domain name is registered and contains your keywords☆119Oct 23, 2023Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,189Jan 11, 2026Updated 3 months ago
- Open Cyber Threat Intelligence Platform☆9,128Updated this week
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026☆21,095Feb 28, 2026Updated last month
- HardeningKitty and Windows Hardening Settings☆2,606Mar 16, 2026Updated 3 weeks ago
- IoT Guide☆28Feb 6, 2022Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,565Jan 18, 2026Updated 2 months ago
- Linux Guide. Learn about Linux Hardware vendors, Linux in the Cloud, Desktop Environments, Window Mangers, Linux Distributions, Linux Sec…☆754Jan 4, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,524Apr 3, 2026Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆650Aug 4, 2025Updated 8 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,932Jul 6, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆69Jul 25, 2025Updated 8 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,329Dec 15, 2024Updated last year
- A concise, directive, specific, flexible, and free incident response plan template☆763May 7, 2024Updated last year
- Bash/PowerShell Guide☆56Jan 4, 2024Updated 2 years ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,917Dec 31, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆817Updated this week
- Automated Adversary Emulation Platform☆6,868Apr 3, 2026Updated last week
- Tools and Techniques for Red Team / Penetration Testing☆8,641Mar 18, 2025Updated last year
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,418Mar 27, 2026Updated 2 weeks ago
- Checklist for container security - devsecops practices☆1,615Sep 15, 2025Updated 6 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,904Oct 29, 2025Updated 5 months ago
- Kubernetes Guide. Learn all about Kubernetes monitoring, networking, and containers. Whether you're running Kubernetes Locally or in the …☆217Jan 4, 2024Updated 2 years ago