HuskyHacks / clarion
The clarion call tells you if someone is logging into an AitM proxy that is proxying your M365 login page
☆77Updated last year
Alternatives and similar repositories for clarion:
Users that are interested in clarion are comparing it to the libraries listed below
- PowerShell tools to help defenders hunt smarter, hunt harder.☆206Updated 2 weeks ago
- Sysmon configuration file templates with advanced event tracing and blocking☆39Updated 2 weeks ago
- A tiny tool to find and fix common misconfigurations in Active Directory-integrated DNS☆107Updated last week
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆103Updated last month
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆72Updated last week
- VirtualGHOST Detection Tool☆89Updated 8 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆163Updated 4 months ago
- ☆58Updated last year
- ☆73Updated 3 weeks ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆82Updated 5 months ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆92Updated 4 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆190Updated 3 weeks ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆208Updated this week
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆27Updated last year
- Microsoft 365 Security Assessment Tool - A Easy-To-Use Microsoft 365 Security Assessment Tool☆69Updated last week
- ☆57Updated this week
- ☆65Updated last year
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆42Updated last year
- Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.☆79Updated last week
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆233Updated last week
- DEFCON 31 slide deck and video link☆58Updated 7 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆110Updated 5 months ago
- KQL queries for cyber defense and for solving daily issues☆46Updated last week
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆37Updated 2 months ago
- This tool is designed to assist you in analyzing issues related to Defender for Endpoint on your local endpoint. It offers a centralized …☆54Updated 2 weeks ago
- Protect your data in minutes !☆116Updated 2 months ago
- ☆24Updated last week
- Tool for creating reports on Entra ID Role Assignments☆90Updated 9 months ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆272Updated 3 weeks ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆101Updated 3 months ago