paulveillard / cybersecurity-security-harderning
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
☆35Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for cybersecurity-security-harderning
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆95Updated 3 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆29Updated 8 years ago
- a curated, categorised collection of useful projects 👨👩👧☆95Updated 3 weeks ago
- ☆15Updated 3 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆36Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆45Updated last year
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆74Updated 3 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆50Updated 3 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆59Updated 2 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆48Updated 4 months ago
- Automate Sysmon Deployment and Configuration☆17Updated 3 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆96Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆29Updated 3 years ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆24Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆68Updated 2 months ago
- A list of resources to build a information security team.☆13Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆53Updated last year
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆35Updated last month
- Security Operation Center Lab☆15Updated last month
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆15Updated this week
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆50Updated 2 years ago
- CSI SIEM☆102Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆37Updated 2 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆23Updated 3 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 6 months ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆58Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- This repository lists all active Microsoft domains | no URLs and no sub-domains | for the purpose of Whitelisting in various systems and …☆22Updated 5 months ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆59Updated 4 years ago
- ☆31Updated 2 years ago