Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best practices, incident management protocols, and community-driven updates. Elevate your security strategy and response with our AI-driven guides.
☆15Apr 14, 2025Updated 11 months ago
Alternatives and similar repositories for InfoSec-Blueprints
Users that are interested in InfoSec-Blueprints are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passivedns monitor implementation in Rust.☆12Apr 21, 2016Updated 9 years ago
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆14Mar 18, 2026Updated last week
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated 2 weeks ago
- Decoding of the Ford Sync 3 APIM AsBuilt data☆11Jun 16, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Sample terraform repo with multiple resources and a workflow that uses tools to automate cost management, security checks, best practices…☆10Jun 24, 2021Updated 4 years ago
- Elektor.Labs Preferred Parts (ELPP) for electronics projects. Eagle and DesignSpark PCB libraries of tested footprints of common parts in…☆16Jul 20, 2022Updated 3 years ago
- ☆12Jan 8, 2022Updated 4 years ago
- A list of OpenStack Security Best Practices - written in Markdown☆10Apr 8, 2015Updated 10 years ago
- 📦 Shango Deploy | Modern deployment automation tool that simplifies deploying web applications with zero configuration. Supports multipl…☆12Feb 26, 2025Updated last year
- The JetRails 2FA plugin adds an extra layer of security to your Magento store. User based 2FA enablement ensures that admin users are fo…☆11Oct 12, 2024Updated last year
- ☆13Feb 6, 2018Updated 8 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🏣 Amazon Web 🏪 Services through 🕍 hands-on 🏘 projects real 🚂 world use cases 🚋 and guided 🚒 tutorials Perfect 🚜 developers ⛸ Dev …☆31May 11, 2025Updated 10 months ago
- This is a python script that can be run on each Splunk Indexer for the purpose of exporting historical bucket data (raw events + metadata…☆12Jan 31, 2024Updated 2 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- Makes files super hidden on NTFS☆19Aug 14, 2014Updated 11 years ago
- This project demonstrates deploying a secure, scalable Generative AI (GenAI) solution on Azure using a Retrieval-Augmented Generation (RA…☆18Feb 27, 2025Updated last year
- AI-Powered Code Reviews for Best Practices & Security Issues Across Languages☆21Aug 8, 2025Updated 7 months ago
- Powershell Scripts to automatically deploy an image of a prebuilt VM (up-to-date and with pre-deployed tools and apps) to every region yo…☆20Jun 27, 2023Updated 2 years ago
- Cloud Related Projects☆11Oct 8, 2024Updated last year
- AWS multi-account setup via IAC, with scripts for bootstrapping and custom usage☆17Mar 1, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Ansible playbook for setting up a secure and private homelab with multiple machines, following ansible-lint best practices and implementi…☆16Jun 16, 2025Updated 9 months ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- Push-button Security Operations Center using Kubernetes☆13Oct 19, 2016Updated 9 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Mar 6, 2017Updated 9 years ago
- Simple Azure AI Studio setup following Microsoft's best practices for security and access management☆17Sep 27, 2024Updated last year
- A collection of best practices, research, and tools for enhancing security in Web3 applications. Covers smart contract vulnerabilities, b…☆15Feb 12, 2025Updated last year
- A collection of Docker resources, including comprehensive tools and best practices for container management, monitoring, security, automa…☆17May 30, 2025Updated 9 months ago
- Implementation of mod_security rules and Apache best practices for CentOS 5,6,7☆15May 4, 2017Updated 8 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Jan 10, 2019Updated 7 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- NuLink network is a decentralized solution for privacy-preserving applications developers to implement best practices and best of breed s…☆13Oct 30, 2024Updated last year
- Implemented encryption/decryption and signing/verification according to Google's own best security practices.☆19Jun 16, 2023Updated 2 years ago
- *READY TO USE* Terraform baseline for implementing essential AWS security best practices, including Organizations, SSO, MFA, SCPs, Budget…☆25Nov 2, 2024Updated last year
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- ☆16Feb 22, 2022Updated 4 years ago