nsacyber / Pass-the-Hash-Guidance
Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber
☆198Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Pass-the-Hash-Guidance
- Currently not updated for WMIEvent module...☆261Updated 8 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆98Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆322Updated 5 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 4 years ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆209Updated 4 years ago
- Some PowerShell Defensive Scripts☆126Updated 8 years ago
- A framework for PowerShell and PoshSec scripts for network management, security, and maintenance.☆144Updated last year
- Powershell Threat Hunting Module☆279Updated 8 years ago
- IR-Tools - PowerShell tools for IR☆128Updated 7 years ago
- ☆73Updated 6 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆110Updated 8 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆74Updated 8 years ago
- Sysmon configuration☆66Updated 6 years ago
- A powershell script for creating a Windows honeyport.☆87Updated 9 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆76Updated 6 years ago
- Materials of Workshop presented at DEFCON 25☆107Updated 7 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated 10 months ago
- PowerShell No Agent Hunting☆108Updated 6 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆367Updated 5 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆196Updated 6 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 4 years ago
- Some PowerShell Stuff☆280Updated 2 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆162Updated 5 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆163Updated 5 years ago
- Main Build directory☆177Updated 5 years ago