nsacyber / Mitigating-Obsolete-TLS
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
☆272Updated 4 years ago
Alternatives and similar repositories for Mitigating-Obsolete-TLS:
Users that are interested in Mitigating-Obsolete-TLS are comparing it to the libraries listed below
- CISA's catalog of bad practices that are exceptionally risky.☆205Updated 3 months ago
- A set of guidelines and best practices for an awesome engineering team☆223Updated last month
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆600Updated 6 months ago
- ☆561Updated last year
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆134Updated this week
- Logging Made Easy☆708Updated last year
- A list of my personal projects☆174Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 4 months ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆277Updated 3 years ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆271Updated last year
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆216Updated 3 weeks ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆292Updated 5 months ago
- Hashes for vulnerable LOG4J versions☆153Updated 3 years ago
- File Access Policy Daemon☆207Updated this week
- External monitoring for organization assets☆389Updated 8 months ago
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆281Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆341Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆382Updated this week
- A site for CISA directives☆160Updated 8 months ago
- ☆117Updated last year
- CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your…☆101Updated 3 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆135Updated last year
- Building environments to replicate small networks and deploy applications☆319Updated last month
- Implementing the CIS Critical Controls (almost) for Free☆85Updated 2 years ago
- The purpose of the Metrics & Metadata (formerly Identifying Security Threats) working group is to enable stakeholders to have informed co…☆222Updated 10 months ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- Production-ready detection & response queries for osquery☆547Updated this week
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated 5 months ago
- ☆354Updated 3 years ago
- A simple tool to detect outdated shared libraries☆183Updated last year