praveendhac / CISBenchmarksLinks
Hardening audit scripts validating Workstations and Servers based on CIS benchmarks
☆15Updated 4 years ago
Alternatives and similar repositories for CISBenchmarks
Users that are interested in CISBenchmarks are comparing it to the libraries listed below
Sorting:
- Example configuration files for Logstash☆44Updated 5 years ago
- ☆141Updated last year
- A tool for analyzing firewall rules☆156Updated 7 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Scripts and integrations for OSSEC☆40Updated 9 years ago
- Simple block lists hub for PAN-OS DBL feature☆35Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆165Updated 6 years ago
- Nix Audit made easier (RHEL, CentOS)☆64Updated last month
- Vulnerability Data in ES☆146Updated 7 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆127Updated 8 years ago
- This repo contains all of my OS hardening scripts☆68Updated 7 years ago
- Ansible Playbooks for Security Automation with Ansible2 book☆101Updated 6 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- ☆66Updated 7 years ago
- PowerShell Script for Windows Server Compliance / Security Configuration Audit☆62Updated 8 years ago
- Repo for autosnort scripts.☆158Updated 4 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆108Updated 6 years ago
- ☆100Updated 6 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Miscelaneous useful scripts for my day to day projects☆124Updated 4 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated 2 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆154Updated last year
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated last year
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago