r0x000000000033 / Linux-Security-and-Hardening-Security-Guide
Linux Security and Hardening Security Guide
☆211Updated last year
Alternatives and similar repositories for Linux-Security-and-Hardening-Security-Guide:
Users that are interested in Linux-Security-and-Hardening-Security-Guide are comparing it to the libraries listed below
- Linux Security and Monitoring Scripts☆321Updated 5 months ago
- A list of bookmarks I have used since I started my journey in cyber security☆283Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆626Updated 9 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆157Updated 2 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆207Updated 3 months ago
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- ☆172Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆350Updated 2 months ago
- Pwnspoof repository☆258Updated last year
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆121Updated 3 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆243Updated 2 years ago
- ☆236Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆326Updated 4 months ago
- This is a repository for network security tools and technologies.☆96Updated 2 years ago
- Red Team Attack Lab for TTP testing & research☆564Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆553Updated 5 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆645Updated last year
- Practical Windows Forensics Training☆649Updated last year
- Advanced Bash script designed for conducting digital forensics on Linux systems☆141Updated 11 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- List of red team resources☆91Updated 7 years ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Course repository for PowerShell for Pentesters Course☆429Updated 3 years ago
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!☆369Updated last year
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆325Updated 3 weeks ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆293Updated 7 months ago
- ☆158Updated last year
- Dredging up secrets from the depths of the file system☆125Updated 4 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆184Updated 8 months ago