PwnDefend / AzureAuditPrep
☆13Updated 4 years ago
Alternatives and similar repositories for AzureAuditPrep:
Users that are interested in AzureAuditPrep are comparing it to the libraries listed below
- ☆40Updated 3 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆36Updated 3 years ago
- ☆14Updated 3 years ago
- Jupyter notebooks☆22Updated 4 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆25Updated 2 years ago
- Solution to deploy a Sentinel playground demo environment☆55Updated last year
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Updated 3 years ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆9Updated 7 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated last year
- A few scripts I put together to send and receive data from an Azure Log Analytics workspace leveraging the Azure Monitor HTTP Data Collec…☆23Updated last year
- Azure AD Incident Response☆25Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆101Updated last year
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆78Updated 4 years ago
- ☆71Updated 7 months ago
- A WDAC configuration repository with the sole intention of enriching MDE☆28Updated last year
- ☆45Updated last week
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆89Updated 2 years ago
- Azure AD Identity Protection Cookie Spoofing☆31Updated last year
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆39Updated 4 years ago
- Presentations☆17Updated 2 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆24Updated 3 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- BloodHound with a twist of cloud☆76Updated 4 years ago
- Build a domain with three quick PowerShell scripts!☆28Updated 4 years ago
- Presentations from Conferences☆26Updated 4 months ago