sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
☆3,406Updated 4 months ago
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- All the deals for InfoSec related software/tools this Black Friday☆3,858Updated 11 months ago
- A collection of awesome security hardening guides, tools and other resources☆5,972Updated last year
- Ultimate DevSecOps library☆6,445Updated 3 months ago
- 📚 A curated list of awesome Docker security resources☆690Updated 4 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,302Updated 11 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,013Updated 10 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,244Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,517Updated last year
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,710Updated 4 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,018Updated 4 months ago
- Checklist for container security - devsecops practices☆1,598Updated last month
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,730Updated 2 years ago
- All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.☆3,305Updated this week
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.☆544Updated 11 months ago
- CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +100 frameworks wor…☆3,302Updated this week
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,381Updated 4 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,138Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,141Updated this week
- Curating the best DevSecOps resources and tooling.☆1,592Updated last year
- Tool to scan for RouterOS (Mikrotik) forensic artifacts and vulnerabilities.☆970Updated last year
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆980Updated last year
- ♾️ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎☆2,041Updated 2 months ago
- 🛡️ Open-source and next-generation Web Application Firewall (WAF)☆9,307Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,179Updated last month
- Fully automated homelab from empty disk to running services with a single command.☆8,921Updated 2 weeks ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,161Updated 3 weeks ago
- IntelOwl: manage your Threat Intelligence at scale☆4,337Updated last week
- A curated list of awesome CI CD security resources☆652Updated 3 weeks ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆10,306Updated 11 months ago
- Prowler is the Open Cloud Security for AWS, Azure, GCP, Kubernetes, M365 and more. As agent-less, it helps for continuous monitoring, sec…☆12,269Updated this week