r0x000000000033 / Linux-Security-and-Hardening-Security-GuideLinks
Linux Security and Hardening Security Guide
☆211Updated last year
Alternatives and similar repositories for Linux-Security-and-Hardening-Security-Guide
Users that are interested in Linux-Security-and-Hardening-Security-Guide are comparing it to the libraries listed below
Sorting:
- ☆241Updated 6 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆398Updated last year
- DevSecOpsGuides☆189Updated 4 months ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!☆369Updated last year
- A list of bookmarks I have used since I started my journey in cyber security☆286Updated 2 years ago
- ☆182Updated last year
- List of questions, answers and random notes for security interviews☆70Updated 4 years ago
- Dredging up secrets from the depths of the file system☆129Updated 9 months ago
- Linux Security and Monitoring Scripts☆324Updated 10 months ago
- SIEM Cheat Sheet☆75Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆647Updated last year
- CLI tools for forensic investigation of Windows artifacts☆344Updated 2 weeks ago
- ☆345Updated 2 years ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- My public notes about offensive security☆163Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆248Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆295Updated 2 years ago
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆353Updated 11 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆156Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆140Updated last year
- ☆316Updated last year
- A PoC ransomware sample to test out your ransomware response strategy.☆210Updated 3 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆400Updated 2 months ago
- ☆218Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆313Updated last year