sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
☆3,400Updated 3 months ago
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,004Updated 9 months ago
- A collection of awesome security hardening guides, tools and other resources☆5,934Updated last year
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,245Updated last year
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,274Updated 10 months ago
- Ultimate DevSecOps library☆6,413Updated 2 months ago
- 📚 A curated list of awesome Docker security resources☆687Updated 3 months ago
- 🛡️ Open-source and next-generation Web Application Firewall (WAF)☆9,115Updated last week
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,014Updated 3 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,507Updated last year
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,146Updated last year
- Curating the best DevSecOps resources and tooling.☆1,575Updated last year
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,118Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,985Updated this week
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆13,579Updated this week
- Open Adversary Exposure Validation Platform☆1,401Updated this week
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,381Updated 3 months ago
- CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +100 frameworks wor…☆3,238Updated this week
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,710Updated 3 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,732Updated last year
- All the deals for InfoSec related software/tools this Black Friday☆3,841Updated 10 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,694Updated last week
- Checklist for container security - devsecops practices☆1,591Updated 2 weeks ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,161Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,110Updated this week
- Great List of Resources to Build an Enterprise Grade Home Lab☆876Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆4,323Updated last week
- ♾️ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎☆2,034Updated last month
- ContainerSSH: Launch containers on demand☆2,907Updated 2 weeks ago
- Authentication, authorization, traceability and auditability for SSH accesses.☆1,773Updated 2 weeks ago
- Modular and decentralised honeypot☆2,599Updated 4 months ago