mitre / microsoft-windows-10-stig-baselineLinks
InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
☆14Updated 11 months ago
Alternatives and similar repositories for microsoft-windows-10-stig-baseline
Users that are interested in microsoft-windows-10-stig-baseline are comparing it to the libraries listed below
Sorting:
- A web application to streamline the development of STIGs from SRGs☆82Updated 2 months ago
- Logs key Windows process performance metrics. #nsacyber☆68Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 10 months ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆35Updated 7 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- ☆94Updated this week
- (WIP) CIS Microsoft Azure Foundations Benchmark☆17Updated this week
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Updated 2 months ago
- Configuration guidance for implementing BitLocker. #nsacyber☆126Updated 6 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 10 months ago
- ☆55Updated 4 years ago
- ☆19Updated 5 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆29Updated last year
- Corelight@Home script☆46Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated 2 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- ☆20Updated 8 years ago
- Various components we use in labs☆10Updated 5 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆25Updated last year
- ☆34Updated 4 years ago
- Best practices in threat intelligence☆49Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 weeks ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- The eMASS client repository maintains the Enterprise Mission Assurance Support Service (eMASS) Representational State Transfer (REST) App…☆25Updated last month
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 5 years ago
- Security Assessment Data Management and Analysis Tool☆38Updated 4 years ago