robvandenbrink / Critical-Controls-v7
Implementing the CIS Critical Controls (almost) for Free
☆86Updated 2 years ago
Alternatives and similar repositories for Critical-Controls-v7:
Users that are interested in Critical-Controls-v7 are comparing it to the libraries listed below
- Network Appliance Backups in PowerShell☆29Updated 2 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- ☆54Updated 3 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆60Updated 6 months ago
- Security-Focused O365 Management and Log Scripts☆60Updated 2 years ago
- Find accounts using common and default passwords in Active Directory.☆68Updated 5 years ago
- PowerShell Script for Windows Server Compliance / Security Configuration Audit☆61Updated 8 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆39Updated 2 weeks ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- Controls Assessment Specification☆69Updated 2 weeks ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆39Updated 4 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆217Updated 2 months ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- ☆34Updated 3 years ago
- ☆73Updated 2 years ago
- Office365 Log Analysis Framework☆82Updated 5 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- ☆65Updated last month
- Salt States for Configuring the SIFT Workstation☆100Updated last week
- ☆83Updated last month
- Recon Hunt Queries☆76Updated 3 years ago
- ☆58Updated last year
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆81Updated last year
- Main Build directory☆179Updated 5 years ago