nsacyber / AppLocker-Guidance
Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber
☆212Updated last month
Alternatives and similar repositories for AppLocker-Guidance:
Users that are interested in AppLocker-Guidance are comparing it to the libraries listed below
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆203Updated 7 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆198Updated 8 years ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆207Updated 4 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆217Updated 2 months ago
- ☆313Updated 5 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆120Updated 5 years ago
- PowerShell - Rapid Response... For the incident responder in you!☆298Updated 5 years ago
- Collection of scripts for Querying and Managing Active Directory and Domain Controllers☆209Updated 4 years ago
- PowerShell Module to interact with VirusTotal☆119Updated 5 years ago
- Currently not updated for WMIEvent module...☆263Updated 9 years ago
- VOYEUR's main purpose is to generate a fast (and pretty) Active Directory report. The tool is developed entirely in PowerShell (a powerfu…☆160Updated 8 years ago
- KITT - An Open Source PowerShell O365 Business Email Compromise Investigation Tool☆115Updated 4 years ago
- Sysmon Tools for PowerShell☆229Updated 6 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆402Updated 2 years ago
- A PowerShell script that aims to have a fully configured domain built in under 10 minutes, but also apply security configuration and hard…☆198Updated 4 years ago
- Sysmon configuration☆65Updated 6 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆159Updated 2 years ago
- Powershell Threat Hunting Module☆283Updated 8 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- Open source solution to check prospective AD passwords against previously breached passwords☆86Updated 6 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 8 years ago
- Backup of my phishing regular expression testing bench☆147Updated 8 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Updated 6 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year
- Automated, Collection, and Enrichment Platform☆324Updated 5 years ago
- Active Directory Group Policy analyzer☆101Updated 11 years ago