nsacyber / PRUNELinks
Logs key Windows process performance metrics. #nsacyber
☆68Updated 2 years ago
Alternatives and similar repositories for PRUNE
Users that are interested in PRUNE are comparing it to the libraries listed below
Sorting:
- Configuration guidance for implementing BitLocker. #nsacyber☆126Updated 6 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆113Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆226Updated 6 months ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆34Updated 6 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- Tools to assist in forensicating docker☆84Updated 6 months ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 3 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆81Updated 7 years ago
- PowerShell Module to interact with the Shodan service☆141Updated 9 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- Just random powershell things I've put together.☆37Updated 4 months ago
- Alienvault OTX TAXII connector☆56Updated 8 years ago
- ☆55Updated 4 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆200Updated 8 years ago
- Active Directory Group Policy analyzer☆108Updated 11 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated last year
- incident response scripts☆19Updated 6 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- ☆39Updated 5 years ago
- PowerShell Module to interact with VirusTotal☆121Updated 5 years ago
- Corelight@Home script☆44Updated last year
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆43Updated 9 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago