trevorbryant / usgov-controls
US Government controls formatted for usability
☆17Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for usgov-controls
- Azure AD Incident Response☆24Updated 3 years ago
- ☆43Updated 3 weeks ago
- Automation around Entra ID☆34Updated 4 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆51Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆34Updated 10 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆16Updated 2 weeks ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆38Updated 4 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆60Updated 7 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Repository with supporting materials for Invictus Academy/Training☆35Updated last month
- ☆70Updated 2 weeks ago
- repository containing some nmap scripts☆11Updated 3 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆24Updated last year
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 3 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- ☆17Updated 2 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆23Updated 3 months ago
- ASR Configurator, Essentials and Atomic Testing☆35Updated last week
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆10Updated 4 years ago
- Bloodhound Portable for Windows☆51Updated last year
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 2 years ago
- ☆26Updated last year
- ☆14Updated 3 years ago
- ☆13Updated 3 years ago
- create a "simulated internet" cyber range environment☆13Updated last month