Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
☆1,057Jun 27, 2025Updated 8 months ago
Alternatives and similar repositories for Open-Source-Security-Guide
Users that are interested in Open-Source-Security-Guide are comparing it to the libraries listed below
Sorting:
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆2,475Jan 4, 2024Updated 2 years ago
- A collection of awesome security hardening guides, tools and other resources☆6,219Jan 20, 2026Updated 2 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,505Updated this week
- A Networking Guide for getting started with basic/core network components such as wired and wireless network design, configuration, hard…☆96Jan 24, 2022Updated 4 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,188Jul 15, 2024Updated last year
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,532Jan 5, 2026Updated 2 months ago
- A curated list of tools for incident response☆8,879Jul 18, 2024Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆613Dec 8, 2025Updated 3 months ago
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,650Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,547Jul 28, 2024Updated last year
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,274Feb 5, 2026Updated last month
- Tools and Techniques for Blue Team / Incident Response☆3,969Mar 27, 2025Updated 11 months ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- A curated list of Awesome Threat Intelligence resources☆9,953Jan 19, 2026Updated 2 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,037Dec 21, 2024Updated last year
- Daily alert when a new domain name is registered and contains your keywords☆119Oct 23, 2023Updated 2 years ago
- Open Cyber Threat Intelligence Platform☆9,023Updated this week
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,117Jan 11, 2026Updated 2 months ago
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026☆20,940Feb 28, 2026Updated 2 weeks ago
- HardeningKitty and Windows Hardening Settings☆2,598Updated this week
- IoT Guide☆26Feb 6, 2022Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,541Jan 18, 2026Updated 2 months ago
- Linux Guide. Learn about Linux Hardware vendors, Linux in the Cloud, Desktop Environments, Window Mangers, Linux Distributions, Linux Sec…☆748Jan 4, 2024Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,921Jul 6, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,688Mar 13, 2026Updated last week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,014Dec 15, 2024Updated last year
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,470Updated this week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆68Jul 25, 2025Updated 7 months ago
- A concise, directive, specific, flexible, and free incident response plan template☆764May 7, 2024Updated last year
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆787Updated this week
- Bash/PowerShell Guide☆55Jan 4, 2024Updated 2 years ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,900Dec 31, 2025Updated 2 months ago
- Automated Adversary Emulation Platform☆6,811Mar 9, 2026Updated last week
- Tools and Techniques for Red Team / Penetration Testing☆8,587Mar 18, 2025Updated last year
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,325Jan 25, 2026Updated last month
- Checklist for container security - devsecops practices☆1,613Sep 15, 2025Updated 6 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,900Oct 29, 2025Updated 4 months ago
- Kubernetes Guide. Learn all about Kubernetes monitoring, networking, and containers. Whether you're running Kubernetes Locally or in the …☆217Jan 4, 2024Updated 2 years ago