JoeyRentenaar / Office-365-ExtractorLinks
The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)
☆159Updated 2 years ago
Alternatives and similar repositories for Office-365-Extractor
Users that are interested in Office-365-Extractor are comparing it to the libraries listed below
Sorting:
- Office365 Log Analysis Framework☆82Updated 5 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- Invoke-LiveResponse☆148Updated 3 years ago
- Sysmon Tools for PowerShell☆229Updated 6 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Updated 7 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Parser for Windows PowerShell script block logs☆97Updated 10 months ago
- ☆258Updated 6 months ago
- A series of scripts☆98Updated 3 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆208Updated 4 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆203Updated 7 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Sysmon configuration☆65Updated 6 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year
- Powershell Threat Hunting Module☆283Updated 8 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Updated 5 years ago
- PowerShell Module to interact with VirusTotal☆120Updated 5 years ago
- KITT - An Open Source PowerShell O365 Business Email Compromise Investigation Tool☆115Updated 4 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆142Updated 5 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆91Updated 3 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 4 years ago
- A PowerShell script that aims to have a fully configured domain built in under 10 minutes, but also apply security configuration and hard…☆198Updated 4 years ago
- Purple Team Security☆75Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 5 months ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- EventList☆376Updated 4 years ago