christophetd / AdazLinks
Deploy customizable Active Directory labs in Azure - automatically.
☆423Updated 7 months ago
Alternatives and similar repositories for Adaz
Users that are interested in Adaz are comparing it to the libraries listed below
Sorting:
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆583Updated 4 months ago
- Atomic Purple Team Framework and Lifecycle☆299Updated 4 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆817Updated 7 months ago
- Adversary Tactics - PowerShell Training☆1,544Updated 5 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆567Updated 3 years ago
- Public Repo for Atomic Test Harness☆275Updated 3 months ago
- Misc Threat Hunting Resources☆373Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆469Updated last year
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Updated 2 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆324Updated 4 years ago
- Building environments to replicate small networks and deploy applications☆324Updated 6 months ago
- Bloodhound Reporting for Blue and Purple Teams☆1,220Updated 5 months ago
- Miscellaneous tools for BloodHound☆395Updated last year
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆483Updated 8 months ago
- A PowerShell module to deploy active directory decoy objects.☆233Updated 5 years ago
- Timeline of Active Directory changes with replication metadata☆505Updated 4 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆297Updated 10 months ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 3 years ago
- ☆611Updated 2 years ago
- All sysmon event types and their fields explained☆554Updated 3 years ago
- Tool Analysis Result Sheet☆355Updated 7 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆236Updated 5 years ago
- retrieve information via O365 and AzureAD with a valid cred☆724Updated 2 years ago
- Build a attack range in your local machine☆131Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 10 months ago
- Hunting queries and detections☆820Updated 6 months ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆147Updated last year
- PowerShell module for Office 365 and Azure log collection☆269Updated 4 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆298Updated 3 years ago