mitre / microsoft-windows-10-stig-baselineLinks
InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
☆14Updated 10 months ago
Alternatives and similar repositories for microsoft-windows-10-stig-baseline
Users that are interested in microsoft-windows-10-stig-baseline are comparing it to the libraries listed below
Sorting:
- Create machine images containing the Nessus vulnerability scanner☆13Updated last week
- Tool used to perform threat intelligence against packet data☆36Updated 10 months ago
- A web application to streamline the development of STIGs from SRGs☆82Updated last month
- ☆20Updated 7 years ago
- ☆34Updated 4 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆35Updated 7 years ago
- ☆16Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- (WIP) CIS Microsoft Azure Foundations Benchmark☆17Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Security Assessment Data Management and Analysis Tool☆39Updated 4 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Updated last month
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Example Suricata rules implementing some of my detection tactics☆22Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 9 months ago
- ☆19Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Logs key Windows process performance metrics. #nsacyber☆67Updated 2 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- ☆55Updated 4 years ago
- ☆93Updated this week
- Best practices in threat intelligence☆48Updated 3 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- ☆27Updated 4 months ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆29Updated last year
- Automatic detection engineering technical state compliance☆55Updated last year
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago