sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
☆3,435Updated last week
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- A collection of awesome security hardening guides, tools and other resources☆6,100Updated 3 weeks ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,049Updated 7 months ago
- Fully automated homelab from empty disk to running services with a single command.☆9,088Updated 3 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,028Updated last year
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,570Updated this week
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,353Updated last year
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,250Updated 2 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,371Updated this week
- Ultimate DevSecOps library☆6,573Updated 6 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,538Updated last year
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.☆559Updated last year
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,189Updated 4 months ago
- 📚 A curated list of awesome Docker security resources☆707Updated 2 months ago
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,733Updated 4 years ago
- All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.☆3,467Updated this week
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,592Updated 7 months ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,739Updated 2 years ago
- Checklist for container security - devsecops practices☆1,611Updated 4 months ago
- All the deals for InfoSec related software/tools this Black Friday☆4,336Updated 2 months ago
- Selfhosted tech starter pack for development of new project or startup☆1,249Updated 2 years ago
- Resources for Application Security including Web, API, Android, iOS and Thick Client☆688Updated 2 years ago
- Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application☆641Updated 5 years ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,404Updated 7 months ago
- 🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024☆20,726Updated 7 months ago
- Enterprise-ready zero-trust access platform built on WireGuard®.☆8,393Updated this week
- A curated list of awesome CI CD security resources☆807Updated 4 months ago
- Tools and Techniques for Blue Team / Incident Response☆3,916Updated 10 months ago
- Complete Practical Study Plan to become a successful cybersecurity engineer based on roles like Pentest, AppSec, Cloud Security, DevSecOp…☆4,860Updated last month
- This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Chann…☆992Updated last year
- You didn't think I'd go and leave the blue team out, right?☆1,730Updated last month