bluemountaincyber / building-detections-azureView external linksLinks
☆13Feb 18, 2024Updated last year
Alternatives and similar repositories for building-detections-azure
Users that are interested in building-detections-azure are comparing it to the libraries listed below
Sorting:
- ☆15May 9, 2023Updated 2 years ago
- Serverless AWS application to upload and hash evidence files.☆23Oct 26, 2022Updated 3 years ago
- This repository contains various public projects created by the owners of Hybrid Brothers☆21Nov 3, 2023Updated 2 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- Forensic Artifact Collection Tool Matrix☆94Nov 9, 2024Updated last year
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 8 months ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated 2 weeks ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- 5000 Auto YouTube Comments For Video & Shorts Using Selenium with Python on Localhost☆15Nov 16, 2025Updated 3 months ago
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Repo containing documentation and explanation for CSET's harm taxonomy of incidents from AIID.☆18Jun 21, 2024Updated last year
- ☆12Jun 15, 2024Updated last year
- 🛠️ Explore custom C2 TTPs with Aether-C2-Framework, focusing on lightweight Rust implants and stealthy transport stacks to reduce forens…☆18Updated this week
- SafeType™ anonymizes sensitive data typed into ChatGPT to avoid misuse and accidental disclosures☆18Feb 14, 2024Updated 2 years ago
- Monitor/Archive of Azure IAM (Role Definitions and Provider Operations). Tweets at https://twitter.com/maiam_bot☆10Updated this week
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- ☆10Mar 31, 2021Updated 4 years ago
- ☆11May 2, 2022Updated 3 years ago
- Welcome to the Just another Kusto hacker ("JAKH") contest!☆54Jun 6, 2025Updated 8 months ago
- Python library for easy handling of disk-images☆12Feb 11, 2026Updated last week
- ☆14Mar 5, 2021Updated 4 years ago
- ☆12Aug 23, 2021Updated 4 years ago
- Summarize CTI reports with OpenAI☆18Feb 9, 2026Updated last week
- ☆15Mar 12, 2025Updated 11 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- An automation framework for deploying Microsoft Sentinel environments using pipelines. This project combines infrastructure-as-code (Bice…☆20Jul 31, 2025Updated 6 months ago
- Repository with Hunting and Detection Queries for Microsoft Sentinel and Microsoft Defender XDR☆16Nov 7, 2025Updated 3 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated 3 weeks ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- GraphViz dot files into Figma☆14Oct 24, 2025Updated 3 months ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 4 months ago