paulveillard / cybersecurity-security-harderning
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
☆35Updated 2 years ago
Alternatives and similar repositories for cybersecurity-security-harderning:
Users that are interested in cybersecurity-security-harderning are comparing it to the libraries listed below
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆94Updated 5 months ago
- A collection of scripts and configurations for hardening various systems and applications.☆19Updated 5 months ago
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆73Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆48Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆29Updated 8 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆50Updated 3 years ago
- Automate Sysmon Deployment and Configuration☆17Updated 5 months ago
- Security Operation Center Lab☆16Updated 3 months ago
- ☆15Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆38Updated 2 years ago
- a curated, categorised collection of useful projects 👨👩👧☆99Updated 2 weeks ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆20Updated 2 weeks ago
- Enhance the security and compliance of your standalone Windows servers with our STIG script, specifically designed to meet DoD STIG/SRG r…☆62Updated 5 months ago
- A list of resources to build a information security team.☆13Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆69Updated 4 months ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆13Updated 4 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆50Updated 5 months ago
- Extract forensic interesting information from Chrome, Firefox, Safari browsers ...☆29Updated 5 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆58Updated 4 years ago
- Useful PowerShell one-liner (and some two-liner) commands☆23Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆36Updated 3 months ago
- List of resources for buiding a home lab☆254Updated last year
- ☆55Updated 3 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆42Updated 2 months ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆38Updated 2 years ago
- ☆50Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆61Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 8 months ago