sergiomarotco / Network-segmentation-cheat-sheet
Best practices for segmentation of the corporate network of any company
β3,316Updated 10 months ago
Alternatives and similar repositories for Network-segmentation-cheat-sheet:
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,056Updated 3 months ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,121Updated 2 months ago
- A collection of awesome security hardening guides, tools and other resourcesβ5,603Updated 3 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.β1,216Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,683Updated last year
- Ultimate DevSecOps libraryβ5,862Updated 2 months ago
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and hostβ¦β2,013Updated 6 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β941Updated last year
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-β¦β941Updated this week
- Tool to scan for RouterOS (Mikrotik) forensic artifacts and vulnerabilities.β945Updated 8 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ1,943Updated last month
- You didn't think I'd go and leave the blue team out, right?β1,632Updated last year
- a drop-in replacement for Nmap powered by shodan.ioβ2,955Updated 9 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β8,194Updated last week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]β1,422Updated 6 months ago
- π A curated list of awesome Docker security resourcesβ650Updated 2 months ago
- Real-time HTTP Intrusion Detectionβ3,035Updated 11 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threaβ¦β1,241Updated this week
- CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec and Audit Management and supporting +70 frameworks worldwide with auto-mβ¦β2,531Updated this week
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.β2,422Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own inβ¦β3,462Updated this week
- The open source Tines / Splunk SOAR alternative for security engineers.β2,489Updated this week
- IntelOwl: manage your Threat Intelligence at scaleβ3,952Updated this week
- Granular, Actionable Adversary Emulation for the Cloudβ1,895Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation oβ¦β903Updated last week
- A curated list of GPT agents for cybersecurityβ5,821Updated 6 months ago
- Checklist for container security - devsecops practicesβ1,538Updated last year
- All the deals for InfoSec related software/tools this Black Fridayβ3,788Updated 2 months ago
- Arsenal is just a quick inventory and launcher for hacking programsβ3,284Updated 2 months ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communitβ¦β3,147Updated last month