nsacyber / BitLocker-GuidanceLinks
Configuration guidance for implementing BitLocker. #nsacyber
☆121Updated 5 years ago
Alternatives and similar repositories for BitLocker-Guidance
Users that are interested in BitLocker-Guidance are comparing it to the libraries listed below
Sorting:
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆218Updated 3 months ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆109Updated 4 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆199Updated 8 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 9 years ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated last week
- PowerShell Module to interact with VirusTotal☆121Updated 5 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆402Updated 2 years ago
- A module designed to simplify the creation, customization, and deployment of bootable Windows Preinstallation Environment (WinPE) images.☆151Updated 9 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆57Updated 3 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆221Updated 4 months ago
- Find accounts using common and default passwords in Active Directory.☆68Updated 5 years ago
- A series of scripts☆100Updated 3 years ago
- Sysmon configuration☆65Updated 6 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 5 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- Just random powershell things I've put together.☆38Updated last month
- PowerShell Module to interact with the Shodan service☆140Updated 9 years ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆209Updated 4 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆166Updated 6 years ago
- WALKOFF-enabled applications. #nsacyber☆144Updated 6 years ago
- Active Directory Group Policy analyzer☆105Updated 11 years ago
- Currently not updated for WMIEvent module...☆262Updated 9 years ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆252Updated 2 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago