nsacyber / AppLocker-GuidanceLinks
Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber
☆228Updated 6 months ago
Alternatives and similar repositories for AppLocker-Guidance
Users that are interested in AppLocker-Guidance are comparing it to the libraries listed below
Sorting:
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆201Updated 7 years ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆214Updated 4 years ago
- ☆318Updated 5 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆225Updated 8 months ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Updated 8 years ago
- PowerShell Module to interact with VirusTotal☆121Updated 5 years ago
- Security-Focused O365 Management and Log Scripts☆62Updated 2 years ago
- VOYEUR's main purpose is to generate a fast (and pretty) Active Directory report. The tool is developed entirely in PowerShell (a powerfu…☆160Updated 8 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆126Updated 6 years ago
- PowerShell - Rapid Response... For the incident responder in you!☆301Updated 5 years ago
- Collection of scripts for Querying and Managing Active Directory and Domain Controllers☆212Updated 4 years ago
- KITT - An Open Source PowerShell O365 Business Email Compromise Investigation Tool☆115Updated 5 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆406Updated 2 years ago
- Backup of my phishing regular expression testing bench☆151Updated 8 years ago
- Sysmon Tools for PowerShell☆232Updated 7 years ago
- Sysmon configuration☆65Updated 7 years ago
- Currently not updated for WMIEvent module...☆263Updated 9 years ago
- PowerShell Module to interact with the Shodan service☆142Updated 9 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆159Updated 2 years ago
- Find accounts using common and default passwords in Active Directory.☆70Updated 6 years ago
- A series of scripts☆100Updated 3 years ago
- A repo for documents containing curated list of health and (in the future security) checks to be run against a Windows Active-Directory d…☆166Updated 6 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆166Updated 6 years ago
- Exchange Transport rules to detect and enable response to phishing☆419Updated 5 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆657Updated 6 years ago
- Tools to create a Native Windows Audit Collection Platform. Active Directory example provided☆78Updated 5 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆79Updated 7 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago