nsacyber / Mitigating-Obsolete-TLS
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
☆269Updated 3 years ago
Related projects: ⓘ
- A set of guidelines and best practices for an awesome engineering team☆206Updated 3 months ago
- CISA's catalog of bad practices that are exceptionally risky.☆202Updated 3 months ago
- ☆437Updated 2 years ago
- Logging Made Easy☆708Updated 10 months ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆261Updated 3 years ago
- CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your…☆100Updated 3 years ago
- External monitoring for organization assets☆366Updated 3 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,411Updated last year
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆596Updated last month
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆279Updated last year
- BlueHound - pinpoint the security issues that actually matter☆706Updated last year
- A site for CISA directives☆157Updated 3 months ago
- The TLS-Scanner Module from TLS-Attacker☆260Updated 9 months ago
- Understand adversary tradecraft and improve detection strategies☆699Updated last year
- An Internet scale, blazing fast SSL/TLS scanner ( non-blocking, event-driven )☆283Updated 5 months ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆904Updated 2 weeks ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆182Updated 2 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆283Updated last year
- A simple tool to detect outdated shared libraries☆184Updated 6 months ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆129Updated 8 months ago
- Message Header Analyzer Add-in For Outlook☆282Updated this week
- ☆354Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆262Updated 2 weeks ago
- Incident Response Hierarchy of Needs☆435Updated last year
- Building environments to replicate small networks and deploy applications☆316Updated 10 months ago
- ☆113Updated 11 months ago
- Sysmon configuration file template with default high-quality event tracing☆448Updated 7 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆379Updated 5 months ago
- A little tool to play with Azure Identity - Azure Active Directory lab creation tool☆497Updated 3 weeks ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆67Updated 3 weeks ago