paulveillard / cybersecurity-security-harderningLinks
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
☆35Updated 3 years ago
Alternatives and similar repositories for cybersecurity-security-harderning
Users that are interested in cybersecurity-security-harderning are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆100Updated last year
- a curated, categorised collection of useful projects 👨👩👧☆117Updated 3 weeks ago
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆73Updated 4 years ago
- Windows 10/11 hardening scripts☆257Updated 8 months ago
- ☆53Updated 2 years ago
- CSI SIEM☆109Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆33Updated 9 years ago
- List of resources for buiding a home lab☆283Updated 2 years ago
- pcaps of traffic for traffic analysis workshop☆84Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆56Updated 2 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆50Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated 3 weeks ago
- CrowdStrike's Open Source Policy & Contribution Guide☆44Updated 4 months ago
- Bash/PowerShell Guide☆49Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆64Updated last month
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆81Updated 2 weeks ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆46Updated last year
- Create a compliant and secure Windows 10/11 system with our Gold Master image creation tool. Adhere to DoD STIG/SRG Requirements and NSA …☆175Updated last year
- A curated list of awesome threat detection and hunting resources☆19Updated 6 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆402Updated 3 months ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆29Updated last year
- an awesome list of active defense resources☆124Updated 5 years ago
- Take advantage of some more advanced Windows Defender settings.☆67Updated 8 months ago
- Labtainers: A Docker-based cyber lab framework☆293Updated 2 months ago
- Automate Sysmon Deployment and Configuration☆18Updated last year
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25Updated 5 years ago
- The best tools and resources for forensic analysis.☆165Updated 2 years ago
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆47Updated 9 months ago
- This repository is for tools, guides, cheatsheets, and anything else related to learning all different aspects of security.☆92Updated 2 years ago