r0x000000000033 / Linux-Security-and-Hardening-Security-GuideLinks
Linux Security and Hardening Security Guide
☆211Updated 2 years ago
Alternatives and similar repositories for Linux-Security-and-Hardening-Security-Guide
Users that are interested in Linux-Security-and-Hardening-Security-Guide are comparing it to the libraries listed below
Sorting:
- ☆185Updated last year
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆402Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆251Updated 3 years ago
- Linux Security and Monitoring Scripts☆327Updated 2 weeks ago
- A PoC ransomware sample to test out your ransomware response strategy.☆212Updated 5 months ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆144Updated last year
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆125Updated 4 years ago
- ☆240Updated 8 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 2 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆169Updated last month
- A collection of companies that disclose adversary TTPs after they have been breached☆246Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆404Updated 4 months ago
- All of the Best Links and Resources on Cyber Security☆71Updated last month
- Map tracking ransomware, by OCD World Watch team☆473Updated 7 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆138Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- Dredging up secrets from the depths of the file system☆130Updated 11 months ago
- ☆161Updated 2 years ago
- DevSecOpsGuides☆192Updated 6 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆90Updated 4 months ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆276Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆315Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆663Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 7 months ago