T0pCyber / hawk
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
☆708Updated this week
Related projects ⓘ
Alternatives and complementary repositories for hawk
- A PowerShell script that automates the security assessment of Microsoft 365 environments.☆582Updated 3 weeks ago
- Contact: CRT@crowdstrike.com☆706Updated last year
- MDATP☆455Updated 4 months ago
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆421Updated last year
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆481Updated last week
- The Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA)☆304Updated 5 months ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆843Updated last week
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆550Updated last year
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆279Updated last year
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆465Updated 8 months ago
- Tooling for assessing an Azure AD tenant state and configuration☆758Updated 5 months ago
- PowerShell for CrowdStrike's OAuth2 APIs☆368Updated this week
- AADInternals PowerShell module for administering Azure AD and Office 365☆1,304Updated last week
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,375Updated last month
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆883Updated last week
- This script will enable you to reset the krbtgt account password and related keys while minimizing the likelihood of Kerberos authenticat…☆407Updated 8 months ago
- Robust and practical application control for Windows☆605Updated 2 years ago
- Microsoft Sentinel SOC Operations☆239Updated 4 months ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,262Updated last week
- Hunting queries and detections☆730Updated 2 months ago
- Windows OS Hardening with PowerShell DSC☆273Updated 11 months ago
- The core repository for the Maester module with helper cmdlets that will be called from the Pester tests.☆355Updated last week
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,061Updated last year
- Tools for Microsoft cloud fans☆316Updated 7 months ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆526Updated last week
- PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.☆812Updated 8 months ago
- Collection of Intune policies that could assist with implementing ACSC's Windows hardening guidance.☆271Updated 6 months ago
- Azure Sentinel KQL☆413Updated 2 months ago
- Timeline of Active Directory changes with replication metadata☆475Updated this week
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆246Updated 3 years ago