nsacyber / PRUNELinks
Logs key Windows process performance metrics. #nsacyber
☆68Updated 3 years ago
Alternatives and similar repositories for PRUNE
Users that are interested in PRUNE are comparing it to the libraries listed below
Sorting:
- Configuration guidance for implementing BitLocker. #nsacyber☆126Updated 6 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆113Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated 3 weeks ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆228Updated 2 months ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago
- Alienvault OTX TAXII connector☆56Updated 8 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- PowerShell Module to interact with the Shodan service☆145Updated 9 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆82Updated 8 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 4 years ago
- Tools to assist in forensicating docker☆85Updated 10 months ago
- ☆47Updated last month
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 3 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 3 months ago
- Find accounts using common and default passwords in Active Directory.☆70Updated 6 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆40Updated 3 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆32Updated 7 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆98Updated 4 years ago
- PowerShell Module to interact with VirusTotal☆121Updated 6 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆201Updated 9 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆160Updated 6 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 9 years ago
- ☆56Updated 4 years ago
- PhishReporter Outlook Add-In in an Outlook Add-In that allows users to report phishing e-mails to a specific e-mail address for further p…☆35Updated 8 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- Presentation Slides and Video links☆32Updated 4 years ago
- A series of scripts☆100Updated 4 years ago