sergiomarotco / Network-segmentation-cheat-sheet
Best practices for segmentation of the corporate network of any company
☆3,363Updated last year
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆1,974Updated 4 months ago
- Ultimate DevSecOps library☆6,031Updated 5 months ago
- A collection of awesome security hardening guides, tools and other resources☆5,755Updated 7 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,175Updated 6 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆965Updated last year
- All the deals for InfoSec related software/tools this Black Friday☆3,808Updated 5 months ago
- A checklist of anyone practicing Site Reliability Engineering☆2,369Updated last year
- game of active directory☆6,376Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,016Updated last week
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆10,112Updated 5 months ago
- 📚 A curated list of awesome Docker security resources☆670Updated 6 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,103Updated 6 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,238Updated last year
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆7,393Updated this week
- Curating the best DevSecOps resources and tooling.☆1,509Updated 9 months ago
- Checklist for container security - devsecops practices☆1,562Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆4,120Updated this week
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024☆18,482Updated 3 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,711Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,847Updated 3 months ago
- An HTTP toolkit for security research.☆6,903Updated 3 months ago
- Best Practice Auditd Configuration☆1,621Updated 3 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-…☆1,026Updated last week
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,326Updated 3 months ago
- Simple checklist to help you deploying the most important areas of the GNU/Linux production systems - work in progress.☆1,537Updated 5 months ago
- Automating situational awareness for cloud penetration tests.☆2,104Updated 2 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,658Updated last year
- Prowler is an Open Cloud Security Platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security as…☆11,596Updated this week
- A DFIR tool written in Python.☆1,046Updated 3 years ago
- Open Cyber Threat Intelligence Platform☆7,288Updated this week