mitre / microsoft-windows-10-stig-baselineLinks
InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
☆14Updated last year
Alternatives and similar repositories for microsoft-windows-10-stig-baseline
Users that are interested in microsoft-windows-10-stig-baseline are comparing it to the libraries listed below
Sorting:
- A web application to streamline the development of STIGs from SRGs☆82Updated 3 weeks ago
- Security Assessment Data Management and Analysis Tool☆38Updated 4 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆35Updated 7 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Updated 2 months ago
- (WIP) CIS Microsoft Azure Foundations Benchmark☆17Updated 3 weeks ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- Logs key Windows process performance metrics. #nsacyber☆68Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Create machine images containing the Nessus vulnerability scanner☆13Updated last month
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- ☆55Updated 4 years ago
- ☆94Updated 3 weeks ago
- ☆16Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- ☆33Updated 3 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 10 months ago
- ☆20Updated 8 years ago
- Best practices in threat intelligence☆50Updated 3 years ago
- ☆34Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 11 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- ☆47Updated last month
- Various components we use in labs☆10Updated 5 years ago