The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities.
☆21Jun 5, 2018Updated 7 years ago
Alternatives and similar repositories for MCRA
Users that are interested in MCRA are comparing it to the libraries listed below
Sorting:
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Chitrarth: Bridging Vision and Language for a Billion People☆13Feb 12, 2025Updated last year
- ☆14Nov 12, 2021Updated 4 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆13Dec 23, 2025Updated 2 months ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- multi-cluster gateway controller, manages multi-cluster gateways based on gateway api and policy attachment☆11Dec 11, 2024Updated last year
- Open Service Mesh (OSM) on Azure☆13Jan 27, 2026Updated last month
- In this project, we need to find out commercial products listed on Google that refer to the same entity across Amazon by comparing the si…☆11Nov 7, 2016Updated 9 years ago
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- Custom firmware for DEFCON 27 badge which iterates over all types☆12Aug 11, 2019Updated 6 years ago
- Python based summer project☆10Feb 28, 2018Updated 8 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- Helpers for getting CHN up and running through the Quickstart guide☆12Mar 2, 2021Updated 5 years ago
- Privacy Protection Application (PPA): Code and instructions for building two tools for processing vehicle trip, or trajectory, data to pr…☆13Oct 8, 2018Updated 7 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 4 years ago
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- ☆16Dec 3, 2020Updated 5 years ago
- Home Assistant Configuration☆10May 13, 2020Updated 5 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- 💥 Implementation of zip bomb, using python script.☆12Dec 18, 2021Updated 4 years ago
- Matos is an open-source cloud security tool for analyzing multi-cloud infrastructure security.☆17Feb 16, 2023Updated 3 years ago
- LaTeX Report Template for Offensive Security's OSCP Exam.☆13Mar 13, 2022Updated 3 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Security awareness base course☆17Oct 16, 2020Updated 5 years ago
- Official Procurement Living Application example for Bonita☆11Nov 26, 2025Updated 3 months ago