sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
☆3,380Updated last month
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆986Updated last month
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆1,995Updated 7 months ago
- A collection of awesome security hardening guides, tools and other resources☆5,850Updated 10 months ago
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.☆543Updated 8 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,078Updated this week
- CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +100 frameworks wor…☆3,053Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,483Updated last year
- 📚 A curated list of awesome Docker security resources☆681Updated last month
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,241Updated last year
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,220Updated 8 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,356Updated last month
- Tool to scan for RouterOS (Mikrotik) forensic artifacts and vulnerabilities.☆959Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,729Updated last year
- Checklist for container security - devsecops practices☆1,583Updated last year
- Open source Tines / Splunk SOAR alternative. All-in-one automation platform (workflows, tables, cases) for security and IT teams.☆2,922Updated this week
- Web Attack Cheat Sheet☆4,311Updated last week
- 🛡️ Open-source and next-generation Web Application Firewall (WAF)☆8,842Updated this week
- All the deals for InfoSec related software/tools this Black Friday☆3,828Updated 8 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,681Updated last month
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024☆19,332Updated last month
- A curated collection of publicly available resources on how technology and tech-savvy organizations around the world practice Site Reliab…☆9,402Updated last week
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,648Updated this week
- Incident Response Methodologies 2022☆1,062Updated 3 months ago
- Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application☆624Updated 5 years ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,683Updated 3 years ago
- Open Cyber Threat Intelligence Platform☆7,543Updated last week
- IntelOwl: manage your Threat Intelligence at scale☆4,216Updated this week
- Resources for Application Security including Web, API, Android, iOS and Thick Client☆680Updated 2 years ago
- Microsoft Security Copilot is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders …☆555Updated last month
- A DFIR tool written in Python.☆1,049Updated 4 years ago