DataDog / ghbusterLinks
A tool to identify and investigate inauthentic GitHub user accounts and repositories.
☆13Updated 2 weeks ago
Alternatives and similar repositories for ghbuster
Users that are interested in ghbuster are comparing it to the libraries listed below
Sorting:
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆40Updated 10 months ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆64Updated 2 weeks ago
- VirtualGHOST Detection Tool☆92Updated last year
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆135Updated last week
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆12Updated 6 months ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆307Updated last month
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆117Updated last week
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆254Updated last year
- Presentations from Conferences☆29Updated 11 months ago
- ☆61Updated 2 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 2 months ago
- MDE relies on some of the Audit settings to be enabled☆98Updated 3 years ago
- ☆74Updated last week
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆16Updated 8 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆110Updated 2 weeks ago
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆74Updated 6 months ago
- Tool for creating reports on Entra ID Role Assignments☆96Updated last year
- Velociraptor Server hosted in Azure App Service☆56Updated 2 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated last year
- ☆26Updated 2 years ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated 3 weeks ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆126Updated 7 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆27Updated 9 months ago
- ☆101Updated last month
- Collection of Microsoft Identity Threat Detection and Response resources.☆49Updated last month
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆264Updated last month
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆317Updated 7 months ago
- Azure administrative tiering based on known attack paths☆119Updated this week