azurecitadel / azure-security-labView external linksLinks
Adam Raffe and Tom Wilde's Azure Security Lab
☆68Sep 28, 2018Updated 7 years ago
Alternatives and similar repositories for azure-security-lab
Users that are interested in azure-security-lab are comparing it to the libraries listed below
Sorting:
- Hands-on Security Labs focused on Azure IaaS Security☆60Jan 19, 2020Updated 6 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Oct 31, 2021Updated 4 years ago
- Monitor/Archive of Azure IAM (Role Definitions and Provider Operations). Tweets at https://twitter.com/maiam_bot☆10Updated this week
- ☆20Jan 12, 2022Updated 4 years ago
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- Azure Security Lab Workshop☆44Jun 21, 2018Updated 7 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- Web File Manager☆12Aug 21, 2025Updated 5 months ago
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,177Dec 27, 2023Updated 2 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆64Updated this week
- Sentinel BEC IR☆14Aug 18, 2022Updated 3 years ago
- Microsoft Cloud App Security labs☆14Dec 17, 2018Updated 7 years ago
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆140May 16, 2022Updated 3 years ago
- ☆617Jun 1, 2023Updated 2 years ago
- ☆120Mar 28, 2025Updated 10 months ago
- ☆50Jan 30, 2026Updated 2 weeks ago
- ☆42Aug 12, 2022Updated 3 years ago
- ☆21May 25, 2025Updated 8 months ago
- ☆22Aug 29, 2023Updated 2 years ago
- powershell script to simulate activity by a user☆22Jul 29, 2020Updated 5 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Welcome to the hands-on resource hub for the Generative AI Development Environments Bootcamp. This repo is designed to help you explore d…☆25Oct 22, 2025Updated 3 months ago
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆145Oct 12, 2020Updated 5 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆235Jun 17, 2022Updated 3 years ago
- ☠️ Code for the Defcon Workshop☆23Aug 6, 2024Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆179May 28, 2025Updated 8 months ago
- Java archive implant toolkit.☆61Apr 20, 2025Updated 9 months ago
- A PowerShell module for the Defender XDR portal☆63Feb 3, 2026Updated last week
- Material for the "Hands-On BloodHound" Workshop☆111May 4, 2021Updated 4 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆674Jun 4, 2024Updated last year
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 2 years ago
- FFXI Gearswap Lua for the impaired☆10Feb 2, 2026Updated last week
- msImpersonate - User account impersonation written in pure Python3☆108May 17, 2022Updated 3 years ago
- General Content☆25Dec 23, 2025Updated last month
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago