christophetd / Adaz
Deploy customizable Active Directory labs in Azure - automatically.
☆416Updated 3 months ago
Alternatives and similar repositories for Adaz:
Users that are interested in Adaz are comparing it to the libraries listed below
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆560Updated 3 months ago
- Atomic Purple Team Framework and Lifecycle☆292Updated 4 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,163Updated 3 weeks ago
- Building environments to replicate small networks and deploy applications☆321Updated last month
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- Misc Threat Hunting Resources☆373Updated 2 years ago
- Public Repo for Atomic Test Harness☆265Updated 8 months ago
- Hunting queries and detections☆776Updated 2 months ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆552Updated 3 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆478Updated 4 months ago
- Miscellaneous tools for BloodHound☆390Updated 8 months ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆235Updated 4 years ago
- Adversary Tactics - PowerShell Training☆1,539Updated 5 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆796Updated 3 months ago
- PowerShell framework to assess Azure security☆1,159Updated 6 months ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 2 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆958Updated last year
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆486Updated 6 years ago
- MDATP☆459Updated 8 months ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Updated 4 years ago
- PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.☆844Updated last year
- retrieve information via O365 and AzureAD with a valid cred☆708Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated 5 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆457Updated 8 months ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆609Updated 9 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆289Updated 3 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆656Updated 4 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆296Updated 5 months ago
- Tool Analysis Result Sheet☆347Updated 7 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆716Updated last week