Best practices for segmentation of the corporate network of any company
☆3,433Feb 2, 2026Updated last month
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Ultimate DevSecOps library☆6,613Jul 17, 2025Updated 7 months ago
- A collection of awesome security hardening guides, tools and other resources☆6,193Jan 20, 2026Updated last month
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026☆20,845Updated this week
- The premier source of truth powering network automation. Open source under Apache 2. Try NetBox Cloud free: https://netboxlabs.com/produc…☆19,912Updated this week
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,664Jun 22, 2025Updated 8 months ago
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆14,828Updated this week
- Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elasti…☆81,340Dec 27, 2025Updated 2 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,541Jul 28, 2024Updated last year
- Open Cyber Threat Intelligence Platform☆8,893Updated this week
- DevOps resources - Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azur…☆9,469Jul 12, 2024Updated last year
- AI-ready API traffic analyzer for Kubernetes, providing deep packet inspection with complete API and Kubernetes contexts, retaining clust…☆11,803Updated this week
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the m…☆12,626Feb 25, 2026Updated last week
- The Single Sign-On Multi-Factor portal for web apps, now OpenID Certified™☆26,976Updated this week
- This repository started out as a learning in public project for myself and has now become a structured learning map for many in the commu…☆29,355Jun 4, 2025Updated 9 months ago
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆32,280Updated this week
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,103Feb 25, 2026Updated last week
- game of active directory☆7,484Jul 16, 2025Updated 7 months ago
- Fully automated homelab from empty disk to running services with a single command.☆9,115Nov 6, 2025Updated 3 months ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,735Oct 27, 2021Updated 4 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,858Sep 10, 2025Updated 5 months ago
- Diagram as Code for prototyping cloud system architectures☆42,035Feb 7, 2026Updated 3 weeks ago
- Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security…☆11,213Feb 18, 2026Updated 2 weeks ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,251Nov 21, 2025Updated 3 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,415Dec 20, 2025Updated 2 months ago
- HardeningKitty and Windows Hardening Settings☆2,591Feb 25, 2026Updated last week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆34,190Updated this week
- A curated list of amazingly awesome open-source sysadmin resources.☆33,064Updated this week
- Comfortably monitor your Internet traffic 🕵️♂️☆32,844Feb 24, 2026Updated last week
- A vulnerability scanner for container images and filesystems☆11,652Updated this week
- 🛡️ Open-source and next-generation Web Application Firewall (WAF)☆10,056Feb 25, 2026Updated last week
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,055Dec 11, 2024Updated last year
- Awesome list of open-source startup alternatives to well-known SaaS products 🚀☆18,820Sep 3, 2025Updated 6 months ago
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,617Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,488Feb 16, 2026Updated 2 weeks ago
- An evolving how-to guide for securing a Linux server.☆24,596Oct 19, 2024Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,738Oct 20, 2023Updated 2 years ago
- Build AI Agents the easy way. Supports PostgreSQL, MySQL, MariaDB, MSSQL, MongoDB, Rest API, Docker, K8s, and more 🚀 AI Workflow toolki…☆27,660Updated this week
- Enterprise-ready zero-trust access platform built on WireGuard®.☆8,434Updated this week