EHLOBen / MDO-HerosLinks
Advanced Hunting Queries
☆19Updated last month
Alternatives and similar repositories for MDO-Heros
Users that are interested in MDO-Heros are comparing it to the libraries listed below
Sorting:
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 5 months ago
- ResearchDev - XDR & SIEM Detection☆65Updated 5 months ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Updated 6 months ago
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆76Updated 2 weeks ago
- ☆74Updated last week
- ☆61Updated 2 years ago
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆103Updated last week
- ☆57Updated this week
- ASR Configurator, Essentials and Atomic Testing☆97Updated 5 months ago
- ☆109Updated last year
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆106Updated last year
- M365 Defender SOC Playbooks☆24Updated 2 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆81Updated 2 years ago
- ☆110Updated 2 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- AppLocker Policy Generator☆22Updated last month
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆271Updated last year
- Hunting Queries for Defender ATP☆81Updated 5 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆110Updated last month
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆56Updated 4 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆28Updated 10 months ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17Updated 5 months ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆21Updated 9 months ago
- Conditional Access Reporting☆27Updated 6 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated 2 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆17Updated last year
- ☆53Updated last year