TheTechBeast8 / HardeningAudit
Deployment scripts and a simple reports for CIS benchmarks
☆19Updated last month
Related projects ⓘ
Alternatives and complementary repositories for HardeningAudit
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆36Updated last week
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆47Updated 2 years ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆47Updated 10 months ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 3 months ago
- Azure AD Incident Response☆24Updated 3 years ago
- Security Scripts and Sources for daily usage.☆49Updated 3 weeks ago
- ☆14Updated 3 years ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆88Updated last month
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆15Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 4 years ago
- ☆34Updated last year
- ☆26Updated last year
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆28Updated 2 years ago
- A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Control…☆50Updated last year
- Slides of my public talks☆46Updated 11 months ago
- VirtualGHOST Detection Tool☆87Updated 6 months ago
- Welcome to the Cloud Security Toolkit repository, your all-in-one destination for cutting-edge cloud security resources! Whether you're d…☆16Updated last week
- ☆40Updated last year
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 3 months ago
- A tool to display Windows Event logs as they happen.☆12Updated last year
- ASR Configurator, Essentials and Atomic Testing☆36Updated 3 weeks ago
- Automation around Entra ID☆34Updated 4 months ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆11Updated 4 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆38Updated 4 years ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆98Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated 2 weeks ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆24Updated last year