Security automation content in SCAP, Bash, Ansible, and other formats
-
Updated
Jun 14, 2024 - Shell
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Security automation content in SCAP, Bash, Ansible, and other formats
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Hardening Ubuntu. Systemd edition.
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Documentation for the Compliant Kubernetes project
Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
An ongoing collection infosec courses, learning tutorials, libaries, and training resources.
BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetooth-enabled devices. Could be used in the vulnerability research, penetration testing and bluetooth hacking. We also collected and classified Bluetooth vulnerabilities in an "Awesome Bluetooth Security" way
My Privacy DNS #Matrix lists for blacklisting
Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection
👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetration testing and offensive cybersecurity.
Incident Forensic Response In Terminal script for linux
A lab illustrating how some basic wifi hacking tools work.
An introductory lab to automotive security.
A few utilities to work with JWTs.
This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools that exist on kali linux.
All things Cybersecurity!
A quick script to install google on linux
Created by The cybersecurity community