LMGsec / O365-Lockdown
Secure and log *available* activities in your Microsoft Office 365 environment
☆38Updated 6 years ago
Alternatives and similar repositories for O365-Lockdown:
Users that are interested in O365-Lockdown are comparing it to the libraries listed below
- incident response scripts☆19Updated 6 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- PowerShell Script for Windows Server Compliance / Security Configuration Audit☆61Updated 8 years ago
- ☆15Updated 3 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- Security-Focused O365 Management and Log Scripts☆60Updated 2 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- This Powershell script is designed to be run on a supported (by Microsoft) Windows host. It checks for the most common issues that will p…☆25Updated 3 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Automated forensics written in PowerShell☆34Updated 5 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- Quick binary search for NTLM hash dataset☆17Updated 6 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 4 years ago
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆25Updated 4 years ago
- Hardens Windows Server to CIS Standards☆40Updated 5 years ago
- Find accounts using common and default passwords in Active Directory.☆68Updated 5 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 3 months ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Jupyter notebooks☆23Updated 4 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆27Updated 6 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 4 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆33Updated 6 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- Get all AD objects which are hidden from you☆18Updated 7 years ago