Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
☆1,070Jun 27, 2025Updated 10 months ago
Alternatives and similar repositories for Open-Source-Security-Guide
Users that are interested in Open-Source-Security-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆2,660Jan 4, 2024Updated 2 years ago
- A collection of awesome security hardening guides, tools and other resources☆6,325May 5, 2026Updated 2 weeks ago
- IntelOwl: manage your Threat Intelligence at scale☆4,578Updated this week
- A Networking Guide for getting started with basic/core network components such as wired and wireless network design, configuration, hard…☆104Jan 24, 2022Updated 4 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,294Jul 15, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,598Jan 5, 2026Updated 4 months ago
- A curated list of tools for incident response☆9,039May 6, 2026Updated 2 weeks ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆629May 9, 2026Updated last week
- A curated list of Awesome Threat Intelligence resources☆10,219Jan 19, 2026Updated 4 months ago
- Tools and Techniques for Blue Team / Incident Response☆4,033Mar 27, 2025Updated last year
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,731Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,566Jul 28, 2024Updated last year
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,304Apr 6, 2026Updated last month
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆652Jun 19, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,338Jan 11, 2026Updated 4 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,041Dec 21, 2024Updated last year
- Daily alert when a new domain name is registered and contains your keywords☆120Oct 23, 2023Updated 2 years ago
- Open Cyber Threat Intelligence Platform☆9,379Updated this week
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026☆21,449Feb 28, 2026Updated 2 months ago
- HardeningKitty and Windows Hardening Settings☆2,621Apr 10, 2026Updated last month
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,962Jul 6, 2024Updated last year
- IoT Guide☆28Feb 6, 2022Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,618Jan 18, 2026Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Linux Guide. Learn about Linux Hardware vendors, Linux in the Cloud, Desktop Environments, Window Mangers, Linux Distributions, Linux Sec…☆776Jan 4, 2024Updated 2 years ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,606May 14, 2026Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,959May 12, 2026Updated last week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆69Jul 25, 2025Updated 9 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,848Apr 13, 2026Updated last month
- Bash/PowerShell Guide☆56Jan 4, 2024Updated 2 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆835Updated this week
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,958Apr 23, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A concise, directive, specific, flexible, and free incident response plan template☆779May 7, 2024Updated 2 years ago
- Automated Adversary Emulation Platform☆6,965May 15, 2026Updated last week
- Tools and Techniques for Red Team / Penetration Testing☆8,755Apr 18, 2026Updated last month
- Checklist for container security - devsecops practices☆1,618Sep 15, 2025Updated 8 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,631Updated this week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,913Oct 29, 2025Updated 6 months ago
- Kubernetes Guide. Learn all about Kubernetes monitoring, networking, and containers. Whether you're running Kubernetes Locally or in the …☆218Jan 4, 2024Updated 2 years ago