sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
β3,409Updated 4 months ago
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- π A curated list of awesome Docker security resourcesβ693Updated 5 months ago
- Ultimate DevSecOps libraryβ6,469Updated 4 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organizationβ2,015Updated 10 months ago
- A collection of awesome security hardening guides, tools and other resourcesβ5,998Updated last year
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β1,023Updated 4 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.β1,246Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operationsβ2,731Updated 2 years ago
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.β544Updated last year
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the mβ¦β11,581Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]β1,518Updated last year
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own inβ¦β4,173Updated this week
- Checklist for container security - devsecops practicesβ1,600Updated 2 months ago
- CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +100 frameworks worβ¦β3,350Updated this week
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,305Updated last year
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-tβ¦β1,143Updated this week
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic lβ¦β2,718Updated 4 years ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOpβ¦β4,752Updated 3 months ago
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,364Updated last month
- Vulnerability scanner written in Go which uses the data provided by https://osv.devβ8,026Updated this week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,166Updated last month
- You didn't think I'd go and leave the blue team out, right?β1,708Updated last month
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threaβ¦β1,385Updated 4 months ago
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.β13,954Updated this week
- All the deals for InfoSec related software/tools this Black Fridayβ3,899Updated 11 months ago
- Fully automated homelab from empty disk to running services with a single command.β8,946Updated last week
- Granular, Actionable Adversary Emulation for the Cloudβ2,187Updated 2 weeks ago
- Open Cyber Threat Intelligence Platformβ7,947Updated this week
- An HTTP toolkit for security research.β9,001Updated 9 months ago
- IntelOwl: manage your Threat Intelligence at scaleβ4,345Updated last week
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking forβ¦β934Updated 2 years ago