PwnDefend / AzureAuditPrep
☆13Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for AzureAuditPrep
- ☆40Updated 3 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆36Updated 3 years ago
- ☆14Updated 3 years ago
- Personal repo for messing with scripts☆25Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- ☆43Updated last month
- Jupyter notebooks☆22Updated 4 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated last year
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated last year
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆88Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 10 months ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Updated 3 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated last year
- Presentations☆17Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆24Updated last year
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated last year
- ☆28Updated 4 years ago
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆78Updated 4 years ago
- Microsoft Azure Exploitation Framework☆54Updated 3 years ago
- Kerberoast Detection Script☆30Updated 3 weeks ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆23Updated 3 years ago
- Azure AD Identity Protection Cookie Spoofing☆31Updated last year
- BloodHound with a twist of cloud☆74Updated 4 years ago
- ☆71Updated 5 months ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- A WDAC configuration repository with the sole intention of enriching MDE☆27Updated last year