sergiomarotco / Network-segmentation-cheat-sheetLinks
Best practices for segmentation of the corporate network of any company
☆3,426Updated 6 months ago
Alternatives and similar repositories for Network-segmentation-cheat-sheet
Users that are interested in Network-segmentation-cheat-sheet are comparing it to the libraries listed below
Sorting:
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,021Updated last year
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,034Updated 6 months ago
- A collection of awesome security hardening guides, tools and other resources☆6,054Updated last year
- 📚 A curated list of awesome Docker security resources☆701Updated last month
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,248Updated last month
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,335Updated 2 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,738Updated 2 years ago
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,442Updated this week
- Ultimate DevSecOps library☆6,519Updated 5 months ago
- Checklist for container security - devsecops practices☆1,610Updated 3 months ago
- A shorter, less intimidating list of infosec resources helpful for anyone trying to learn.☆542Updated last year
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,727Updated 4 years ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,398Updated 6 months ago
- A curated list of awesome CI CD security resources☆798Updated 2 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,325Updated last year
- SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host…☆2,296Updated 5 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,428Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,798Updated 3 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,716Updated 3 weeks ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,527Updated last year
- HardeningKitty and Windows Hardening Settings☆2,573Updated 3 weeks ago
- a drop-in replacement for Nmap powered by shodan.io☆3,149Updated 8 months ago
- Cybersecurity Evaluation Tool☆1,741Updated last week
- Curating the best DevSecOps resources and tooling.☆1,607Updated last year
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,174Updated last year
- All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.☆3,417Updated this week
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,087Updated last month
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,183Updated 2 months ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,121Updated this week
- LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Reque…☆1,461Updated last year