Hardened Windows Server image
☆19Sep 19, 2019Updated 6 years ago
Alternatives and similar repositories for hardened-windows-server
Users that are interested in hardened-windows-server are comparing it to the libraries listed below
Sorting:
- Chef cookbook for windows server hardening☆15Dec 14, 2017Updated 8 years ago
- Windows and macOS Hardening Interface to make security more accessible.☆37Jan 24, 2022Updated 4 years ago
- Ansible playbooks for configuring CIS Microsoft Windows Server Benchmarks☆23Dec 14, 2018Updated 7 years ago
- AWS tools and snippets☆15Dec 30, 2022Updated 3 years ago
- Hardens Windows Server to CIS Standards☆40May 2, 2019Updated 6 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆29Jul 26, 2024Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- Ansible RHEL 7 - CIS Benchmark Hardening Script☆30May 27, 2020Updated 5 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- A list of common Disaster Recovery (DR) scenarios for software companies☆34Sep 13, 2021Updated 4 years ago
- A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benc…☆37Jan 27, 2022Updated 4 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- Purview Automation is a Python library designed to be simple to use and makes scaling and automating Azure Purview easier.☆17Nov 8, 2023Updated 2 years ago
- Executive coaching skill for planning your 2026 using research-backed process goals. Works with Claude Code and Claude.ai.☆28Jan 5, 2026Updated 2 months ago
- ☆11Aug 31, 2019Updated 6 years ago
- IME tool to analyze IntuneManagementExtension.log☆10Apr 25, 2025Updated 10 months ago
- Microsoft Purview - Bulk assign glossary terms, classification and asset description☆11Aug 2, 2023Updated 2 years ago
- Backend for skillgraph - a skill based framework for building agents that work.☆28Nov 10, 2025Updated 4 months ago
- GitBucket Docker Image☆10Jul 17, 2024Updated last year
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Helm-linter plugin to check hard-coded passwords in charts☆12Mar 29, 2019Updated 6 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Lock-free interface and function mocks for Go☆13Jun 18, 2025Updated 8 months ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- Simple command line tool to check for compliance against CIS Benchmarks☆272May 3, 2024Updated last year
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆96Jul 7, 2021Updated 4 years ago
- Notion Database Operator☆14Sep 30, 2025Updated 5 months ago
- Kubernetes operator to manage virtual interfaces on nodes☆13Feb 25, 2023Updated 3 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- ☆11Apr 23, 2020Updated 5 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago