sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
☆3,372Updated last year
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Ultimate DevSecOps library☆6,060Updated 6 months ago
- A collection of awesome security hardening guides, tools and other resources☆5,788Updated 8 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆970Updated last year
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆1,984Updated 5 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,186Updated 6 months ago
- Checklist for container security - devsecops practices☆1,572Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,463Updated 10 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,240Updated last year
- Open source Tines / Splunk SOAR alternative. All-in-one automation platform (workflows, tables, cases) for security and IT teams.☆2,750Updated this week
- Curating the best DevSecOps resources and tooling.☆1,516Updated 10 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-…☆1,046Updated this week
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024☆18,657Updated last month
- Fully automated homelab from empty disk to running services with a single command.☆8,645Updated 2 months ago
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,911Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,029Updated this week
- A Library of various cybersecurity resources☆2,396Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,651Updated 2 weeks ago
- Tools and Techniques for Blue Team / Incident Response☆3,146Updated 2 months ago
- Tools and Techniques for Red Team / Penetration Testing☆6,770Updated 2 months ago
- 📚 A curated list of awesome Docker security resources☆676Updated 7 months ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,721Updated last year
- Collaborative Incident Response platform☆1,201Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,168Updated last month
- game of active directory☆6,448Updated 2 months ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,670Updated 3 years ago
- Incident Response Methodologies 2022☆1,052Updated last month
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,609Updated this week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,401Updated 2 weeks ago
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆7,442Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆980Updated last month