mitre / microsoft-windows-10-stig-baselineLinks
InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
☆14Updated 7 months ago
Alternatives and similar repositories for microsoft-windows-10-stig-baseline
Users that are interested in microsoft-windows-10-stig-baseline are comparing it to the libraries listed below
Sorting:
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated last month
- A web application to streamline the development of STIGs from SRGs☆78Updated this week
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Updated 2 weeks ago
- Logs key Windows process performance metrics. #nsacyber☆68Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆99Updated last year
- Tool used to perform threat intelligence against packet data☆35Updated 6 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- (WIP) CIS Microsoft Azure Foundations Benchmark☆16Updated 3 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 9 months ago
- ☆55Updated 4 years ago
- ☆20Updated 7 years ago
- ☆89Updated last week
- ☆19Updated 4 years ago
- Example Suricata rules implementing some of my detection tactics☆21Updated 2 years ago
- ☆28Updated 3 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- Various components we use in labs☆10Updated 4 years ago
- Security Assessment Data Management and Analysis Tool☆39Updated 4 years ago
- ☆21Updated 2 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated 2 months ago
- ☆34Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- ☆16Updated 4 years ago
- Corelight@Home script☆42Updated last year