SecTemplates is a repository of free templates and resources for information security professionals and startup engineering teams to establish and improve their security programs. The platform provides: 1. Preparation checklists 2. Runbooks 3. Program and process templates 4. Security metrics guidelines 5. Document templates The site covers various security domains, including: - Bug Bounty Program setup - External Penetration Testing processes - Incident Response program establishment - Vulnerability Management program implementation - Security Exceptions program creation Content is freely available for personal and commercial use, with specific licensing restrictions on product development and resale.
FEATURES
SIMILAR TOOLS
Utilizing SIEM, SOAR, and EDR technologies to enhance security operations with a focus on reducing incident response time.
A quick reference guide for the VI editor, covering commands and modes.
A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
BPF+ is a generalized packet filter framework that achieves both high-level expressiveness and good performance for network monitoring and intrusion detection applications.
A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
A structured approach to managing and responding to suspected security events or incidents.
A pocket reference guide providing various options for navigating and pivoting through different environments and situations.
A comprehensive guide on utilizing advanced SSH tunneling techniques for network penetration testing and red team engagements, with a focus on Windows environments and firewall bypass methods.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.