kasmtech / workspaces-stigs
Harden Kasm Workspaces deployments with DISA STIGs
☆10Updated 2 months ago
Alternatives and similar repositories for workspaces-stigs:
Users that are interested in workspaces-stigs are comparing it to the libraries listed below
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆12Updated last month
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 5 years ago
- The web UI for the OpenRMF tool, which uses multiple containers for parts of the distributed openRMF tool for managing DoD STIG checklist…☆26Updated 4 months ago
- Ties pfSense with Suricata into ELK using docker-compose☆28Updated 6 years ago
- A guide on using Zimbra with Elastic Stack using centralized logging☆26Updated last year
- Setup a Primary Domain Controller and Active Directory on a Windows Server with a easy to use and abstracted Ansible role.☆21Updated 10 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 2 years ago
- ☆11Updated 4 years ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- Fortinet configuration file convertor to JSON, XSLS files☆10Updated last year
- OwlH Master API Web User Interface☆12Updated 8 months ago
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- Security Assessment Data Management and Analysis Tool☆38Updated 3 years ago
- (MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.☆27Updated this week
- A bash script to create a persistent port mirror for an IDS within a Proxmox hypervisor☆19Updated 6 years ago
- setup and configure linux auditd☆20Updated last month
- Wazuh - Puppet module☆47Updated this week
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆28Updated 7 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated last month
- ☆13Updated this week
- BLACK ESK SIEM is a SIEM platform built with Elasticsearch, Syslog-Ng and Kibana☆29Updated last year
- ☆12Updated 4 years ago
- CIS hardening for Ubuntu Jammy 22.04☆19Updated 2 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆36Updated 3 months ago
- Build Automated Machine Images for MISP☆28Updated last year
- Pep up your Windows Event Collector (WEC) for Windows Event Forwarding (WEF)☆19Updated 3 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 3 years ago