Best practices for segmentation of the corporate network of any company
☆3,447Feb 2, 2026Updated last month
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Ultimate DevSecOps library☆6,626Mar 5, 2026Updated last week
- A collection of awesome security hardening guides, tools and other resources☆6,212Jan 20, 2026Updated last month
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2026☆20,890Feb 28, 2026Updated last week
- The premier source of truth powering network automation. Open source under Apache 2. Try NetBox Cloud free: https://netboxlabs.com/produc…☆19,946Updated this week
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,677Jun 22, 2025Updated 8 months ago
- Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.☆14,930Updated this week
- Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elasti…☆81,419Dec 27, 2025Updated 2 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,543Jul 28, 2024Updated last year
- DevOps resources - Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azur…☆9,472Jul 12, 2024Updated last year
- Open Cyber Threat Intelligence Platform☆8,993Updated this week
- Cluster-wide network observability for Kubernetes. Captures L4 packets, L7 API calls, and decrypted TLS traffic using eBPF, with full Kub…☆11,815Updated this week
- CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the m…☆12,748Updated this week
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,269Updated this week
- The Single Sign-On Multi-Factor portal for web apps, now OpenID Certified™☆27,047Updated this week
- This repository started out as a learning in public project for myself and has now become a structured learning map for many in the commu…☆29,361Jun 4, 2025Updated 9 months ago
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆32,947Updated this week
- game of active directory☆7,542Updated this week
- Fully automated homelab from empty disk to running services with a single command.☆9,133Feb 27, 2026Updated last week
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,736Oct 27, 2021Updated 4 years ago
- Diagram as Code for prototyping cloud system architectures☆42,064Feb 7, 2026Updated last month
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,867Sep 10, 2025Updated 6 months ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,251Nov 21, 2025Updated 3 months ago
- Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security…☆11,226Mar 3, 2026Updated last week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,423Dec 20, 2025Updated 2 months ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆34,235Updated this week
- A curated list of amazingly awesome open-source sysadmin resources.☆33,157Mar 3, 2026Updated last week
- HardeningKitty and Windows Hardening Settings☆2,597Feb 28, 2026Updated last week
- A vulnerability scanner for container images and filesystems☆11,680Updated this week
- Comfortably monitor your Internet traffic 🕵️♂️☆32,944Updated this week
- 🛡️ Open-source and next-generation Web Application Firewall (WAF)☆10,122Updated this week
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,070Dec 11, 2024Updated last year
- Awesome list of open-source startup alternatives to well-known SaaS products 🚀☆18,851Sep 3, 2025Updated 6 months ago
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,634Updated this week
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,937Updated this week
- An evolving how-to guide for securing a Linux server.☆25,781Mar 5, 2026Updated last week
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,741Oct 20, 2023Updated 2 years ago
- Build AI Agents the easy way. Supports PostgreSQL, MySQL, MariaDB, MSSQL, MongoDB, Rest API, Docker, K8s, and more 🚀 AI Workflow toolki…☆27,724Updated this week
- Enterprise-ready zero-trust access platform built on WireGuard®.☆8,450Updated this week