paulveillard / cybersecurity-security-harderning
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
☆36Updated 3 years ago
Alternatives and similar repositories for cybersecurity-security-harderning
Users that are interested in cybersecurity-security-harderning are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆98Updated 9 months ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆71Updated 3 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 3 weeks ago
- Search a filesystem for indicators of compromise (IoC).☆71Updated 3 months ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated 9 months ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆52Updated 9 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆39Updated 3 years ago
- ☆17Updated 2 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 2 years ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 6 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- Useful PowerShell one-liner (and some two-liner) commands☆23Updated 2 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆13Updated last year
- ☆16Updated 3 years ago
- This repo contains information on how to auto deploy Sysmon via GPO and Task Scheduler☆12Updated 3 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25Updated 4 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆32Updated 8 years ago
- A collection of scripts and configurations for hardening various systems and applications.☆22Updated 9 months ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 4 years ago
- An ACAS/SCAP/CKL scan parser and report generator☆24Updated 4 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- ☆10Updated last year
- Automate Windows Defender STIG to 100% Compliance☆20Updated 9 months ago
- Extracts fields from zeek logs, compatible with zeek-cut☆21Updated 10 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆41Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated 2 months ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 9 months ago