nsacyber / PRUNELinks
Logs key Windows process performance metrics. #nsacyber
☆66Updated 2 years ago
Alternatives and similar repositories for PRUNE
Users that are interested in PRUNE are comparing it to the libraries listed below
Sorting:
- Configuration guidance for implementing BitLocker. #nsacyber☆123Updated 5 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆111Updated 4 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆60Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated last month
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago
- Tools to assist in forensicating docker☆84Updated 4 months ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆220Updated 4 months ago
- Find accounts using common and default passwords in Active Directory.☆69Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆78Updated 7 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- ☆46Updated 2 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- PowerShell Module to interact with the Shodan service☆140Updated 9 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- ☆29Updated 8 years ago
- Just random powershell things I've put together.☆38Updated 2 months ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 9 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- Expert Investigation Guides☆52Updated 4 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- ☆39Updated 5 years ago
- Active Directory Group Policy analyzer☆105Updated 11 years ago
- ☆39Updated 4 years ago
- PowerShell Module to interact with VirusTotal☆121Updated 5 years ago
- Sysmon configuration file template with default high-quality event tracing☆17Updated 4 years ago