paulveillard / cybersecurity-security-harderningLinks
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
☆37Updated 3 years ago
Alternatives and similar repositories for cybersecurity-security-harderning
Users that are interested in cybersecurity-security-harderning are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- a curated, categorised collection of useful projects 👨👩👧☆121Updated last week
- Windows 10/11 hardening scripts☆258Updated 3 weeks ago
- ☆53Updated 2 years ago
- Create a compliant and secure Windows 10/11 system with our Gold Master image creation tool. Adhere to DoD STIG/SRG Requirements and NSA …☆178Updated last year
- CSI SIEM☆110Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- List of resources for buiding a home lab☆284Updated 2 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆44Updated last week
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆64Updated 3 years ago
- A collection of scripts and configurations for hardening various systems and applications.☆22Updated last year
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆73Updated 4 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 4 years ago
- Bash/PowerShell Guide☆49Updated last year
- Automate Sysmon Deployment and Configuration☆19Updated last year
- Useful PowerShell one-liner (and some two-liner) commands☆24Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated 2 weeks ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆57Updated 2 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆52Updated 3 weeks ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25Updated 5 years ago
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆63Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆33Updated 9 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆23Updated last year
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆49Updated 6 months ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆43Updated last month
- ☆22Updated 2 years ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆97Updated 9 months ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆27Updated last year
- an awesome list of active defense resources☆126Updated 5 years ago