mikeroyal / Open-Source-Security-GuideLinks
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
☆990Updated last month
Alternatives and similar repositories for Open-Source-Security-Guide
Users that are interested in Open-Source-Security-Guide are comparing it to the libraries listed below
Sorting:
- Great List of Resources to Build an Enterprise Grade Home Lab☆857Updated last year
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,130Updated 3 weeks ago
- You didn't think I'd go and leave the blue team out, right?☆1,685Updated 2 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,460Updated last month
- Incident Response Methodologies 2022☆1,063Updated 3 months ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,026Updated last month
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆680Updated 3 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,226Updated 8 months ago
- A concise, directive, specific, flexible, and free incident response plan template☆722Updated last year
- A list of online news & info sources in the InfoSec/Cybersecurity space☆353Updated this week
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,978Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,484Updated last year
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.☆543Updated 9 months ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,193Updated last month
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,081Updated 11 months ago
- Resources for Application Security including Web, API, Android, iOS and Thick Client☆680Updated 2 years ago
- ThePhish: an automated phishing email analysis tool☆1,254Updated last year
- 📚 A curated list of awesome Docker security resources☆681Updated 2 months ago
- SIEM Tactics, Techiques, and Procedures☆652Updated this week
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆634Updated 2 months ago
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆755Updated 3 months ago
- Everything related to Linux Forensics☆703Updated 2 years ago
- List of resources for buiding a home lab☆279Updated last year
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆545Updated last week
- Awesome Security lists for SOC/CERT/CTI☆1,052Updated this week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆708Updated 2 weeks ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,707Updated 2 months ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,756Updated this week
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆940Updated last week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,579Updated last year