A collection of Workflows for deploying Security settings, Hardening techniques and Penetration Testing.
These are the network and client tools used for security establishment.