Compare commits

...

10 Commits

Author SHA1 Message Date
Zac the Wise 15fbaacfdd
Merge e37aa24db1 into f220737cd9 2023-09-11 13:49:20 -06:00
sbilly f220737cd9
Merge pull request #241 from jshlbrd/master
docs: Add Substation to Big Data, thx @jshlbrd
2023-09-03 10:56:07 +08:00
sbilly 1585b27f4d
Merge pull request #237 from lirantal/patch-2
feat: update ebooks with new Node.js Secure Coding book
2023-09-03 10:54:41 +08:00
sbilly ecc249c8ba
Merge pull request #234 from keithjjones/drkeithjones
Added blog DrKeithJones.com.
2023-09-03 10:54:20 +08:00
jshlbrd 2b862a43fb docs: add Substation 2023-05-07 09:53:14 -07:00
Liran Tal 2df49de16a
feat: update ebooks with new Node.js Secure Coding book
Adds the hands-on practical book [Node.js Secure Coding: Defending Against Command Injection Vulnerabilities](https://www.nodejs-security.com)

Learn secure coding conventions in Node.js by executing command injection attacks on real-world npm packages and analyzing vulnerable code.
2023-04-28 12:12:29 +03:00
Keith Jones 0b9f42545f Added DrKeithJones.com. 2023-03-11 17:14:28 -05:00
TechWiz-3 e37aa24db1 add good link to whitelist 2022-10-19 11:46:06 +11:00
TechWiz-3 1b7cd96ed9 add whitelist to linkcheck 2022-10-18 15:35:05 +11:00
TechWiz-3 4caa3ddcb3 add link check action 2022-10-18 15:31:26 +11:00
2 changed files with 20 additions and 0 deletions

17
.github/workflows/linkcheck.yml vendored Normal file
View File

@ -0,0 +1,17 @@
name: Link-check
on:
schedule:
- cron: '0 0 * * 1' # every monday
push:
jobs:
build:
runs-on: ubuntu-latest
steps:
- name: Run linksafe
uses: TechWiz-3/linksafe@fast
with:
whitelist_links: "http://www.clamav.net/,https://www.cipherdyne.org/fwknop/,http://bruteforce.gr/honeydrive,https://ossec.github.io/,https://www.hardenwindows10forsecurity.com/"
env:
TOKEN: ${{ secrets.TOKEN }}

View File

@ -99,12 +99,14 @@ Thanks to all [contributors](https://github.com/sbilly/awesome-security/graphs/c
- [Matano](https://github.com/matanolabs/matano): Open source serverless security lake platform on AWS that lets you ingest, store, and analyze petabytes of security data into an Apache Iceberg data lake and run realtime Python detections as code.
- [Falco](https://falco.org/) - The cloud-native runtime security project and de facto Kubernetes threat detection engine now part of the CNCF.
- [VAST](https://github.com/tenzir/vast) - Open source security data pipeline engine for structured event data, supporting high-volume telemetry ingestion, compaction, and retrieval; purpose-built for security content execution, guided threat hunting, and large-scale investigation.
- [Substation](https://github.com/brexhq/substation) - Substation is a cloud native data pipeline and transformation toolkit written in Go.
### IDS / IPS / Host IDS / Host IPS
- [Snort](https://www.snort.org/) - Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS)created by Martin Roesch in 1998. Snort is now developed by Sourcefire, of which Roesch is the founder and CTO. In 2009, Snort entered InfoWorld's Open Source Hall of Fame as one of the "greatest [pieces of] open source software of all time".
- [Zeek](https://zeek.org/) - Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
- [zeek2es](https://github.com/corelight/zeek2es) - An open source tool to convert Zeek logs to Elastic/OpenSearch. You can also output pure JSON from Zeek's TSV logs!
- [DrKeithJones.com](https://drkeithjones.com) - A blog on cyber security and network security monitoring.
- [OSSEC](https://ossec.github.io/) - Comprehensive Open Source HIDS. Not for the faint of heart. Takes a bit to get your head around how it works. Performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, MacOS, Solaris, HP-UX, AIX and Windows. Plenty of reasonable documentation. Sweet spot is medium to large deployments.
- [Suricata](http://suricata-ids.org/) - Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). Suricata is developed by the OISF and its supporting vendors.
- [Security Onion](http://blog.securityonion.net/) - Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Zeek, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
@ -452,6 +454,7 @@ Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technolog
- [Edge Computing Technology and Applications](https://www.manning.com/books/edge-computing-technology-and-applications) - A book about the business and technical foundation you need to create your edge computing strategy.
- [Spring Security in Action, Second Edition](https://www.manning.com/books/spring-security-in-action-second-edition) - A book about designing and developing Spring applications that are secure right from the start.
- [Azure Security](https://www.manning.com/books/azure-security-2) - A practical guide to the native security services of Microsoft Azure.
- [Node.js Secure Coding: Defending Against Command Injection Vulnerabilities](https://www.nodejs-security.com) - Learn secure coding conventions in Node.js by executing command injection attacks on real-world npm packages and analyzing vulnerable code.
## Other Awesome Lists