paulveillard / cybersecurity-security-harderning
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
☆35Updated 3 years ago
Alternatives and similar repositories for cybersecurity-security-harderning:
Users that are interested in cybersecurity-security-harderning are comparing it to the libraries listed below
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆96Updated 6 months ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆51Updated 2 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆50Updated 7 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆30Updated 8 years ago
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆72Updated 3 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆12Updated 11 months ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆22Updated this week
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆26Updated 6 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 2 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆40Updated 2 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆36Updated last week
- Security Monitoring using Wazuh, published by Packt☆16Updated 10 months ago
- Automate Sysmon Deployment and Configuration☆17Updated 6 months ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆24Updated 4 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆59Updated 4 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆23Updated 6 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆41Updated 2 years ago
- a curated, categorised collection of useful projects 👨👩👧☆100Updated 2 weeks ago
- This repo contains information on how to auto deploy Sysmon via GPO and Task Scheduler☆12Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆57Updated 3 weeks ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆77Updated 4 months ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆70Updated last week
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 5 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆46Updated last year
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆51Updated 3 years ago
- Useful PowerShell one-liner (and some two-liner) commands☆23Updated 2 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆37Updated 3 years ago