sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
β3,388Updated last month
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- π A curated list of awesome Docker security resourcesβ683Updated 2 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.β1,242Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]β1,499Updated last year
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ1,998Updated 8 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β1,002Updated last month
- A collection of awesome security hardening guides, tools and other resourcesβ5,900Updated 10 months ago
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.β543Updated 9 months ago
- Ultimate DevSecOps libraryβ6,357Updated last month
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,248Updated 9 months ago
- Tool to scan for RouterOS (Mikrotik) forensic artifacts and vulnerabilities.β961Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,730Updated last year
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-tβ¦β1,095Updated this week
- A curated list of awesome CI CD security resourcesβ556Updated 9 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threaβ¦β1,367Updated last month
- Checklist for container security - devsecops practicesβ1,585Updated last year
- All the deals for InfoSec related software/tools this Black Fridayβ3,832Updated 8 months ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic lβ¦β2,691Updated 3 years ago
- A checklist of anyone practicing Site Reliability Engineeringβ2,394Updated last year
- You didn't think I'd go and leave the blue team out, right?β1,684Updated 2 weeks ago
- Great List of Resources to Build an Enterprise Grade Home Labβ862Updated last year
- Incident Response Methodologies 2022β1,066Updated 4 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.β1,724Updated 3 months ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOpβ¦β4,669Updated 3 weeks ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own inβ¦β3,876Updated last week
- CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +100 frameworks worβ¦β3,091Updated last week
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking forβ¦β933Updated 2 years ago
- IntelOwl: manage your Threat Intelligence at scaleβ4,273Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,244Updated last month
- A DFIR tool written in Python.β1,050Updated 4 years ago
- The Tenets of IT: an accumulation of IT advice, wisdom, and humour.β398Updated 2 years ago