hackingbutlegal / Mac-OSX-STIGLinks
This script helps automate application of DISA's security config to an OS X machine
☆50Updated 11 years ago
Alternatives and similar repositories for Mac-OSX-STIG
Users that are interested in Mac-OSX-STIG are comparing it to the libraries listed below
Sorting:
- Draft SP 800-179r1 macOS 10.12 Security project files: draft publication, security settings spreadsheet and Bash script implementation of…☆116Updated 6 years ago
- OS X Strata builds upon Yelps OSXCollector, providing a user interface to analyze data collected from a potentially compromised system.☆14Updated 6 years ago
- This repo contains all of my OS hardening scripts☆69Updated 7 years ago
- Shell scripts to audit OS X security using CIS Benchmarks.☆18Updated 8 years ago
- Filters that process and transform the output of osxcollector☆77Updated 5 years ago
- Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.☆193Updated 3 years ago
- [DEPRECATED] A quickstart demo for Kolide tools☆52Updated 7 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- Repo for the development of STONIX, the Security Tool for *NIX☆65Updated 5 years ago
- You'll Never Take Me Alive!☆234Updated 9 years ago
- Certification Authority Trust Tracker☆126Updated 7 years ago
- App Engine-based escrow solution for enterprise management of disk encryption technologies for OS X (FileVault 2), Windows (BitLocker), a…☆278Updated 4 years ago
- Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.☆105Updated 7 years ago
- Cleans out "open" wireless connections from OSX machine☆153Updated 5 years ago
- Toolkit for auditing "phone home" behavior on Mac OS X Yosemite.☆289Updated 10 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- Audit Preference Pane and Log Reader for OS X☆40Updated 12 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆131Updated 8 years ago
- Generates and changes MAC Addresses for both OS X and Linux. Allows the generation of both random and MAC Addresses from a given manufact…☆21Updated 12 years ago
- ALPHA/WIP for OSquery configuration for Mac and Linux Operating Systems☆16Updated 7 years ago
- pan-stix☆19Updated 7 years ago
- ☆36Updated 4 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Updated 10 years ago
- Deploy Kolide's Fleet into AWS using Terraform.☆15Updated 7 years ago
- Osquery Mangement Server☆115Updated 4 years ago
- PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.☆30Updated 5 years ago
- Install and configure user mode auditd tools☆34Updated 2 years ago
- ☆32Updated 11 years ago
- Configure Your Macbook For Blackhat☆172Updated 6 years ago