sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
☆3,403Updated 3 months ago
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Ultimate DevSecOps library☆6,415Updated 2 months ago
- A collection of awesome security hardening guides, tools and other resources☆5,946Updated last year
- 📚 A curated list of awesome Docker security resources☆688Updated 4 months ago
- Tool to scan for RouterOS (Mikrotik) forensic artifacts and vulnerabilities.☆966Updated last year
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,015Updated 3 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,005Updated 9 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,278Updated 11 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,243Updated last year
- Checklist for container security - devsecops practices☆1,593Updated 3 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,729Updated last year
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.☆543Updated 11 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,512Updated last year
- CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +100 frameworks wor…☆3,247Updated this week
- You didn't think I'd go and leave the blue team out, right?☆1,699Updated last week
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,155Updated last week
- All the deals for InfoSec related software/tools this Black Friday☆3,848Updated 10 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,119Updated this week
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆2,286Updated last year
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,383Updated 3 months ago
- Offensive Software Exploitation Course☆2,384Updated 2 years ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,391Updated 3 months ago
- Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application☆626Updated 5 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆935Updated 2 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,413Updated last year
- Vulnerable app with examples showing how to not use secrets☆1,359Updated this week
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆13,665Updated this week
- A curated list of awesome CI CD security resources☆645Updated last week
- The Tenets of IT: an accumulation of IT advice, wisdom, and humour.☆398Updated 2 years ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆2,779Updated this week
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆4,004Updated this week