ThalesGroup / security-risk-assessment-tool
The ISRA security-risk-assessment-tool project is an Electron based application used to do security risk assessments at a technical level
☆26Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for security-risk-assessment-tool
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated 2 weeks ago
- ☆79Updated last year
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆25Updated 3 months ago
- ☆15Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆47Updated 2 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆11Updated 4 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆22Updated 2 months ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆33Updated 11 months ago
- PowerShell based STIG Scanner.☆11Updated last year
- Bloodhound Portable for Windows☆51Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Kerberoast Detection Script☆30Updated 3 weeks ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆25Updated 2 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Logpresso Mini and community contents for incident response☆16Updated 3 years ago
- Indicators of Normality☆12Updated 2 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 3 years ago
- Extract CIS benchmarks from PDFs☆10Updated last year
- External telegram feeder for AIL framework☆13Updated last week
- Autopsy Module to analyze Registry Hives☆13Updated 2 years ago
- ☆11Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Nessus Audit files☆30Updated last year
- Simulates a compromise in a cloud and container environment☆32Updated 2 years ago
- Create a windows Active Directory lab☆13Updated 5 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year