The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
HardeningKitty Alternatives
Similar projects and alternatives to HardeningKitty
-
Wazuh
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
Adalanche
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
-
vulnerable-AD
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
-
AutomatedLab
AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 2022, some Linux distributions and various products like AD, Exchange, PKI, IIS, etc.
-
AutomaticMaintenance
Discontinued Helps IT engineers to establish a continuous update process in large intertangled infrastructures.
-
QA-Checks-v4
Discontinued PowerShell scripts to ensure consistent and reliable build quality and configuration for your servers
-
hardentools
Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
HardeningKitty reviews and mentions
-
If You Had To Create All IT Policies From Scratch
Also Hardening-Kitty. https://github.com/scipag/HardeningKitty
- CIS benchmark Windows Server 2022
- Windows OS Security
-
Creating a jump host in 2023
Critically, harden the OS. Like, more than you think you need to. Way more. Consider the jump host capability as a core component of each system/environment/platform/application it's used to access/manage and assess value and risk with all those business processes/functions in mind even though you're using one jump host for each of those use cases because, inevitably, the same template/container/configuration/script will be reused so any misconfigurations will replicate. If you need a Windows OS, consider hardening kitty as it offers a locally executable option for both hardening and auditing. If you need to met regulatory requirements (HIPAA, CMMC, FISMA, PCI, etc.), consider OpenSCAP or whatever paid solution you use for agent-based vuln scans (avoid less intensive solutions that only run unauthenticated scans or network-based audits, they tend to avoid non-CVE vulns that exist in the configuration). If you need to rely on open source endpoint security solutions like Wazuh make sure they integrate nicely with SIEM, SOAR, and remote management. Wherever possible, use DevOps-friendly solutions for configuration management (think Ansible and Terraform vice Github Actions :) ) and remember that, if you're responding to an incident, you're going to want to suspend all of your jump boxes, retain any storage and their full memory state, and spin up verifiably clean jump boxes so you have confidence in your connections into the environment. This is the most commonly overlooked need (most orgs seem to be aware of their privilege sprawl issue) and it has a MASSIVE impact on your ability to quickly begin effective investigation and response efforts in the event of an incident (most orgs do NOT seem to be aware of this and it costs them time and meaningful information during incidents).
- Active Directory Security Tools
- Help!! Is there a Scanning tool that helps scan the whole Windows Build Image?
-
Is Windows Defender for Business any good?
Agree. Harden your endpoints (if unsure where to start consider hardening kitty, https://github.com/scipag/HardeningKitty) and harden Defender (https://0ut3r.space/2022/03/06/windows-defender/). Add Sysmon with a good config (https://github.com/olafhartong/sysmon-modular) and you've reached a good starting point.
-
Ciphers... Edge... I wanna AES256 SHA384 only
I use a tool called Hardening-Kitty https://github.com/scipag/HardeningKitty , which has recommended policy lists from a variety of organizations. I check my computer with all of them. They don't all agree, of course, so I kind of pick and choose a little. But the lists have helped me find things I had no idea where they were.
- PowerShell script to confirm server configuration
-
There’s a GitHub repo for testing every single Windows security / privilege mechanism. I’ve lost the book mark, anyone know it?
A related tool that I found somewhere on reddit recently: HardeningKitty
-
A note from our sponsor - WorkOS
workos.com | 25 Apr 2024
Stats
scipag/HardeningKitty is an open source project licensed under MIT License which is an OSI approved license.
The primary programming language of HardeningKitty is PowerShell.
Popular Comparisons
- HardeningKitty VS windows_hardening
- HardeningKitty VS AutomaticMaintenance
- HardeningKitty VS SchannelConfiguration
- HardeningKitty VS hardentools
- HardeningKitty VS PowerZure
- HardeningKitty VS Audit-Test-Automation
- HardeningKitty VS UltimateAppLockerByPassList
- HardeningKitty VS DomainProtect
- HardeningKitty VS PSSystemAdministrator
- HardeningKitty VS NorthPoint-Installer
Sponsored