paulveillard / cybersecurity-security-harderning
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
☆34Updated 2 years ago
Related projects: ⓘ
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆86Updated last month
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆45Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆32Updated last year
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆58Updated 2 years ago
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆70Updated 3 years ago
- ☆13Updated 2 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆48Updated last month
- a curated, categorised collection of useful projects 👨👩👧☆93Updated 2 weeks ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆32Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆64Updated 2 years ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆30Updated 4 months ago
- Search a filesystem for indicators of compromise (IoC).☆66Updated 3 weeks ago
- ☆51Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆45Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆35Updated last year
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆28Updated 5 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆28Updated 2 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆23Updated last month
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆45Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆49Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆90Updated last year
- Useful PowerShell one-liner (and some two-liner) commands☆20Updated 2 years ago
- ☆14Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆53Updated last year
- Ansible Playbooks for SimeonOnSecurity's STIG Scripts☆14Updated last month
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆26Updated 3 years ago
- Windows Forensics Environment Builder☆106Updated 3 months ago
- Extracts fields from zeek logs, compatible with zeek-cut☆19Updated 2 months ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆13Updated 4 years ago