awesome-security-hardening
NIST-to-Tech
awesome-security-hardening | NIST-to-Tech | |
---|---|---|
6 | 2 | |
4,941 | 102 | |
- | - | |
4.7 | 3.9 | |
27 days ago | 3 months ago | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-security-hardening
-
rate my threat model i will be implementing and i need help and tips also
If you want to go extreme, I remember from many years ago, there used to be a publicly released document by Australia's cyber security agency, made largely for Windows, which used to list attack vectors on a complex scale. I used to follow their listed possible vectors to formulate threat models as a kid for my Windows computer. Back in the day they used to provide PDF, now its webpages (https://www.cyber.gov.au/acsc/view-all-content/advice/guidelines-system-hardening). This also exists (https://github.com/decalage2/awesome-security-hardening), a bit more wide coverage of OSes and practices.
-
Resources to learn backend security from scratch
Maybe these two repos can help you, I've used them both from time to time to look up stuff I have no idea about as a frontend main: https://github.com/imthenachoman/How-To-Secure-A-Linux-Server https://github.com/decalage2/awesome-security-hardening
- Android fans, what are the primary reasons why you will never ever switch to an Iphone?
- Resource for best practices/standard?
-
Brand new to Docker
here is a collection of hardening guides This will get you started in the right direction.
-
I Recently had a data breach and i think i secured everything. But did i? Help me please.
This is called system hardening. Try looking for CIS Benchmarks, awesome hardening (github), STIG's ,mitre baseline, hardening kitty, hardening checklist
NIST-to-Tech
-
List of Open Source Security Tools
Reminds me a bit of a GitHub repo I started that maps closed and open source tools to the NIST CSF: https://github.com/mikeprivette/NIST-to-Tech
- Cyber security tools that combats phishing detection in emails
What are some alternatives?
windows_hardening - HardeningKitty and Windows Hardening settings and configurations
Application-Security-Engineer-Interview-Questions - Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exhaustive list but i felt these questions were important to be asked and some were challenging to answer
microsoft-windows-10-stig-baseline - InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
PWF - Practical Windows Forensics Training
dockerholics - Apps and examples from the Dockerholics group.
CS7038-Malware-Analysis - Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
awesome-golang-security - Awesome Golang Security resources πΆπ
gitlab-watchman - Finding exposed secrets and personal data in GitLab
awesome-cybersecurity-blueteam - :computer:π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
boobsnail - BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.
Digital-Forensics-Guide - Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Firecrack - :fire: Firecrack pentest tools: Facebook hacking random attack, deface, admin finder, bing dorking: