trevorbryant / usgov-controlsLinks
US Government controls formatted for usability
☆17Updated 3 years ago
Alternatives and similar repositories for usgov-controls
Users that are interested in usgov-controls are comparing it to the libraries listed below
Sorting:
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆47Updated last month
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- ☆13Updated 4 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆18Updated last week
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last week
- ☆11Updated 3 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 4 months ago
- Jupyter notebooks☆25Updated 4 years ago
- ☆14Updated 4 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆106Updated 5 months ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated last year
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- A WDAC configuration repository with the sole intention of enriching MDE☆28Updated 2 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- ☆41Updated 2 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆16Updated 3 years ago
- CSIRT Jump Bag☆26Updated last year
- ☆42Updated 4 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 5 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year