r0x000000000033 / Linux-Security-and-Hardening-Security-Guide
Linux Security and Hardening Security Guide
☆211Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Linux-Security-and-Hardening-Security-Guide
- ☆158Updated 8 months ago
- ☆217Updated last year
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆126Updated last year
- CLI tools for forensic investigation of Windows artifacts☆315Updated 3 weeks ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆117Updated 3 years ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆130Updated 7 months ago
- Dredging up secrets from the depths of the file system☆116Updated 2 weeks ago
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!☆366Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆246Updated last month
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆583Updated 5 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆372Updated 10 months ago
- ☆330Updated last year
- Map tracking ransomware, by OCD World Watch team☆411Updated 2 months ago
- A list of bookmarks I have used since I started my journey in cyber security☆282Updated 2 years ago
- ☆297Updated this week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆338Updated 3 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆138Updated 7 months ago
- ☆248Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆172Updated 10 months ago
- ☆147Updated last year
- Nuclei templates for honeypots detection.☆194Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆237Updated 2 years ago
- Pwnspoof repository☆257Updated last year
- Red Team Guides☆134Updated 10 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆279Updated 3 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 5 months ago
- Linux Security and Monitoring Scripts☆318Updated last month
- ThreatSeeker: Threat Hunting via Windows Event Logs☆114Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆241Updated 6 months ago
- Different learning materials☆215Updated 3 months ago