hackingbutlegal / Mac-OSX-STIGLinks
This script helps automate application of DISA's security config to an OS X machine
☆50Updated 11 years ago
Alternatives and similar repositories for Mac-OSX-STIG
Users that are interested in Mac-OSX-STIG are comparing it to the libraries listed below
Sorting:
- Draft SP 800-179r1 macOS 10.12 Security project files: draft publication, security settings spreadsheet and Bash script implementation of…☆117Updated 6 years ago
- This repo contains all of my OS hardening scripts☆69Updated 7 years ago
- OS X Strata builds upon Yelps OSXCollector, providing a user interface to analyze data collected from a potentially compromised system.☆14Updated 6 years ago
- Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.☆193Updated 3 years ago
- Shell scripts to audit OS X security using CIS Benchmarks.☆18Updated 9 years ago
- Filters that process and transform the output of osxcollector☆77Updated 5 years ago
- [DEPRECATED] A quickstart demo for Kolide tools☆52Updated 7 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- Repo for the development of STONIX, the Security Tool for *NIX☆65Updated 5 years ago
- You'll Never Take Me Alive!☆234Updated 9 years ago
- Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.☆105Updated 7 years ago
- Certification Authority Trust Tracker☆126Updated 7 years ago
- Cleans out "open" wireless connections from OSX machine☆153Updated 5 years ago
- Deploy Kolide's Fleet into AWS using Terraform.☆15Updated 7 years ago
- Audit Preference Pane and Log Reader for OS X☆40Updated 12 years ago
- App Engine-based escrow solution for enterprise management of disk encryption technologies for OS X (FileVault 2), Windows (BitLocker), a…☆278Updated 4 years ago
- ALPHA/WIP for OSquery configuration for Mac and Linux Operating Systems☆16Updated 7 years ago
- Example luggage packages☆60Updated last year
- Toolkit for auditing "phone home" behavior on Mac OS X Yosemite.☆289Updated 10 years ago
- ☆36Updated 4 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 10 years ago
- Start enforcing G Suite third-party apps via OAuth☆58Updated 7 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 8 years ago
- ☆141Updated last year
- PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.☆30Updated 5 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆131Updated 8 years ago
- Python tools for Mac system administration☆175Updated 3 years ago
- Batch files to provision OS X as a virtual machine host and manage those VMs.☆74Updated 11 years ago
- OSX Installer Verifier☆57Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago