trevorbryant / usgov-controlsLinks
US Government controls formatted for usability
☆16Updated 4 years ago
Alternatives and similar repositories for usgov-controls
Users that are interested in usgov-controls are comparing it to the libraries listed below
Sorting:
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- Pushes Sysmon Configs☆90Updated 4 years ago
- ☆68Updated 4 years ago
- Conference presentations☆60Updated 3 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- MDE relies on some of the Audit settings to be enabled☆100Updated 3 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆157Updated last year
- Jupyter notebooks☆25Updated 5 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Updated 4 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- Random tips and tricks RE: ransomware☆14Updated 4 years ago
- ☆43Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Updated 3 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆152Updated last year
- ☆43Updated 4 years ago
- Azure function to insert MISP data in to Azure Sentinel☆34Updated 3 years ago
- ☆50Updated 2 weeks ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 4 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 3 years ago
- A WDAC configuration repository with the sole intention of enriching MDE☆30Updated 7 months ago
- ☆61Updated 2 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- ☆73Updated last year
- ☆29Updated 5 years ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆10Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Presentations☆17Updated 3 years ago