57 skills found · Page 1 of 2
aws / Aws Eks Best PracticesA best practices guide for day 2 operations, including operational excellence, security, reliability, performance efficiency, and cost optimization.
Scrut1ny / OpSec GuideThe Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhance their privacy, anonymity, and security in their personal and professional lives. By implementing robust measures to mitigate the risk of tracking and mass surveillance, individuals can safeguard their sensitive.
YorCreative / Laravel ScrubberA Laravel package to scrub sensitive information that breaks operational security policies from being leaked on accident or not by developers.
BushidoUK / Operational Security 101A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the security of their devices.
NullArray / NetSetOperational Security utility and automator.
cloud-gouv / SecurixSécurix is a NixOS-based secure operating system tailored for small to medium-sized teams. It provides a minimal, hardened environment with strong isolation, reproducibility, and policy-driven configurations to ensure operational security and compliance.
vmware / Vcf Security And Compliance GuidelinesSecurity, compliance, and operational resilience resources applicable to VMware Cloud Foundation and VMware vSphere. This repository is an official VMware repository managed by Broadcom staff.
aws / Aws Emr Best PracticesA best practices guide for using AWS EMR. The guide will cover best practices on the topics of cost, performance, security, operational excellence, reliability and application specific best practices across Spark, Hive, Hudi, Hbase and more.
arbabnazar / Ansible Aws Vpc Ha WordpressThe purpose of Ansible AWS VPC Highly-Available Wordpress is to create a fully operational AWS VPC infrastructure(subnets,routeing tables,igw etc), it will also create everything that need to be for creating EC2 and RDS instances (security key, security group, subnet group)
grugq / Security GuidesCollected and authored guides for personal and operational security.
RichardLitt / Awesome OpsecAwesome Operational Security resources
arbabnazar / Terraform Ansible Aws Vpc Ha WordpressThe purpose of Terraform Ansible AWS VPC Highly-Available Wordpress is to create a fully operational AWS VPC infrastructure(subnets,routeing tables,igw etc), it will also create everything that need to be for creating EC2 and RDS instances (security key, security group, subnet group)
melicertes / CspThe Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing confidence and trust among the national Computer Security Incident Response Teams (CSIRTs) of the Member States and for promoting swift and effective operational cooperation.
W3OSC / Web3 Opsec StandardThe Web3 Operational Security Standard (W3OS)
lawsecnet / OPSECCollection of various materials on operational security.
Raiders0786 / DigibastionDon't Get Rekt. Protect Your Crypto from Phishing & Scams
iwilare / Formal MethodsOperational semantics, Type-based information flow security, Hoare logic, Verification conditions, and Separation logic in Agda for the IMP language
SPKavati / Threat Intelligence Machine Learning Approach To ICS Security The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, compelling, proactive, and continuous security monitoring is needed. In this study, we propose a process to build an intelligent backend and visual system to handle real time data analytics. For that we demonstrate the use of the Security Information and Event Management (SIEM) tool, Splunk, to aggregate operational intelligence including network, system, and user behavior data. Also, to transform collected raw data into Indicators of Compromise (IOC) added intelligence data, we demonstrate the use of open source threat intelligence platforms. Real time analytics is then applied to prepared intelligence test data using MATLAB. With the proof of concept tool, Tableau, we present ICS system visual solutions, which can support security personnel to make decisions, understand concepts, or foresee the network problems.
ExRecon / ExreconExRecon – An advanced, TOR-routed Nmap automation framework for Kali Linux. Supports modular multi-scan recon, firewall evasion, Nikto web audits, and human-readable reporting with delta analysis. Built for stealth and operational security in red teaming, pen testing, and OSINT workflows.
maruf009sultan / FLUCKYFlucky - Advanced Bluetooth HID Attack Platform 🦆 Professional-grade wireless security testing tool featuring automatic BLE connectivity, psychological awareness testing, LOLBAS integration, and military-grade encryption. Built exclusively for authorized red teams, academic research, security awareness training, and educational purposes.