sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
☆3,421Updated 5 months ago
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,020Updated 11 months ago
- A collection of awesome security hardening guides, tools and other resources☆6,023Updated last year
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,030Updated 5 months ago
- 📚 A curated list of awesome Docker security resources☆699Updated 3 weeks ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,311Updated last year
- Ultimate DevSecOps library☆6,496Updated 4 months ago
- Checklist for container security - devsecops practices☆1,605Updated 2 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,247Updated 3 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,735Updated 2 years ago
- A curated list of awesome CI CD security resources☆793Updated 2 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,171Updated last year
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,766Updated last week
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,785Updated 2 months ago
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.☆543Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,178Updated 2 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,253Updated last week
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆9,818Updated 2 weeks ago
- Tool to scan for RouterOS (Mikrotik) forensic artifacts and vulnerabilities.☆973Updated last year
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,723Updated 4 years ago
- Web Attack Cheat Sheet☆4,380Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,524Updated last year
- All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.☆3,390Updated this week
- You didn't think I'd go and leave the blue team out, right?☆1,706Updated last week
- a drop-in replacement for Nmap powered by shodan.io☆3,147Updated 7 months ago
- An authoritative list of awesome devsecops tools with the help from community experiments and contributions.☆5,201Updated last year
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,389Updated 5 months ago
- Resources for Application Security including Web, API, Android, iOS and Thick Client☆686Updated 2 years ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,304Updated 3 weeks ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,427Updated last year
- Curating the best DevSecOps resources and tooling.☆1,591Updated last year