r0x000000000033 / Linux-Security-and-Hardening-Security-Guide
Linux Security and Hardening Security Guide
☆211Updated last year
Alternatives and similar repositories for Linux-Security-and-Hardening-Security-Guide
Users that are interested in Linux-Security-and-Hardening-Security-Guide are comparing it to the libraries listed below
Sorting:
- Linux Security and Monitoring Scripts☆322Updated 7 months ago
- ☆239Updated 3 months ago
- A list of bookmarks I have used since I started my journey in cyber security☆284Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆636Updated 11 months ago
- ☆819Updated last year
- Pwnspoof repository☆261Updated last year
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- Red Team Guides☆138Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆244Updated 2 years ago
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!☆369Updated last year
- A PoC ransomware sample to test out your ransomware response strategy.☆210Updated 3 weeks ago
- ☆337Updated 2 years ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆330Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆327Updated 6 months ago
- ☆210Updated last year
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆118Updated 2 years ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆157Updated 2 years ago
- Dredging up secrets from the depths of the file system☆126Updated 6 months ago
- ☆266Updated last year
- ☆475Updated this week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆385Updated 3 months ago
- ☆177Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆301Updated 9 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆565Updated 6 months ago
- Different learning materials☆226Updated 2 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆315Updated 10 months ago
- This is a repository for network security tools and technologies.☆96Updated 2 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆148Updated last year
- Checklists for Testing Security environment☆794Updated 2 months ago