Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
☆1,054Jun 27, 2025Updated 8 months ago
Alternatives and similar repositories for Open-Source-Security-Guide
Users that are interested in Open-Source-Security-Guide are comparing it to the libraries listed below
Sorting:
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆2,444Jan 4, 2024Updated 2 years ago
- A collection of awesome security hardening guides, tools and other resources☆6,193Jan 20, 2026Updated last month
- IntelOwl: manage your Threat Intelligence at scale☆4,467Updated this week
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,163Jul 15, 2024Updated last year
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,512Jan 5, 2026Updated last month
- A curated list of tools for incident response☆8,832Jul 18, 2024Updated last year
- A Networking Guide for getting started with basic/core network components such as wired and wireless network design, configuration, hard…☆95Jan 24, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆68Jul 25, 2025Updated 7 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,631Updated this week
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,229Feb 5, 2026Updated 3 weeks ago
- Daily alert when a new domain name is registered and contains your keywords☆119Oct 23, 2023Updated 2 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆612Dec 8, 2025Updated 2 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- Open Cyber Threat Intelligence Platform☆8,893Updated this week
- A curated list of Awesome Threat Intelligence resources☆9,814Jan 19, 2026Updated last month
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,419Feb 20, 2026Updated last week
- Tools and Techniques for Blue Team / Incident Response☆3,942Mar 27, 2025Updated 11 months ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,041Jan 11, 2026Updated last month
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,541Jul 28, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,034Dec 21, 2024Updated last year
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,906Jul 6, 2024Updated last year
- A Huge Learning Resources with Labs For Offensive Security Players☆1,103Dec 9, 2025Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,340Feb 19, 2026Updated last week
- Arsenal is just a quick inventory and launcher for hacking programs☆3,687Nov 29, 2024Updated last year
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024☆20,799Jun 28, 2025Updated 8 months ago
- Automated Adversary Emulation Platform☆6,761Feb 17, 2026Updated last week
- Bash/PowerShell Guide☆54Jan 4, 2024Updated 2 years ago
- HardeningKitty and Windows Hardening Settings☆2,591Updated this week
- Linux Guide. Learn about Linux Hardware vendors, Linux in the Cloud, Desktop Environments, Window Mangers, Linux Distributions, Linux Sec…☆743Jan 4, 2024Updated 2 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,768Dec 15, 2024Updated last year
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,872Dec 31, 2025Updated 2 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,249Jan 25, 2026Updated last month
- Tools and Techniques for Red Team / Penetration Testing☆8,534Mar 18, 2025Updated 11 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,899Oct 29, 2025Updated 4 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,452Feb 14, 2026Updated 2 weeks ago
- Checklist for container security - devsecops practices☆1,613Sep 15, 2025Updated 5 months ago
- OSINT Template Engine☆568Jul 20, 2023Updated 2 years ago