turbot / steampipe-mod-zoom-complianceLinks
Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampipe.
☆66Updated 3 months ago
Alternatives and similar repositories for steampipe-mod-zoom-compliance
Users that are interested in steampipe-mod-zoom-compliance are comparing it to the libraries listed below
Sorting:
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated last month
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Collection of useful Canary tools☆91Updated 3 weeks ago
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- ☆189Updated 2 weeks ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 7 years ago
- ☆34Updated 2 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- ☆77Updated last month
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated 11 months ago
- ☆120Updated last month
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Updated 4 years ago
- ☆32Updated 7 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆83Updated 2 weeks ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Tools and scripts by Arctic Wolf☆70Updated 4 months ago
- ☆15Updated 6 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated 2 years ago
- ☆65Updated last year
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- ☆77Updated 3 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Incident Response Playbooks☆15Updated 6 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- A Docker container for remote penetration testing.☆142Updated 4 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- Cloud Security Operations Orchestrator☆188Updated last year