Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
☆1,429Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for Sparrow
Users that are interested in Sparrow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contact: CRT@crowdstrike.com☆750Apr 27, 2023Updated 2 years ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆929Mar 9, 2026Updated 2 weeks ago
- ☆645Jun 6, 2023Updated 2 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆790Oct 29, 2022Updated 3 years ago
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,509Mar 19, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A collection of scripts for assessing Microsoft Azure security☆2,326Mar 15, 2026Updated last week
- Cybersecurity Evaluation Tool☆1,787Mar 20, 2026Updated last week
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,692Jan 8, 2024Updated 2 years ago
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,053Feb 17, 2022Updated 4 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,080Nov 28, 2024Updated last year
- A DFIR tool written in Python.☆1,052Jun 9, 2021Updated 4 years ago
- PowerShell framework to assess Azure security☆1,263Oct 18, 2025Updated 5 months ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆952Feb 11, 2026Updated last month
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆5,548Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,362Feb 19, 2026Updated last month
- ☆2,667Mar 5, 2024Updated 2 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,551Feb 5, 2026Updated last month
- Six Degrees of Domain Admin☆10,558Mar 2, 2026Updated 3 weeks ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,481Dec 31, 2025Updated 2 months ago
- A repository of sysmon configuration modules☆2,996Aug 21, 2024Updated last year
- Bloodhound Reporting for Blue and Purple Teams☆1,280Nov 15, 2025Updated 4 months ago
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆451Jun 16, 2023Updated 2 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,384Feb 10, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,304Jun 1, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,269Jan 21, 2026Updated 2 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,921Jul 6, 2024Updated last year
- ☆2,392Oct 14, 2023Updated 2 years ago
- MDATP☆455Jul 20, 2024Updated last year
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆587Jan 22, 2025Updated last year
- Sysmon configuration file template with default high-quality event tracing☆5,438Jul 3, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,508Jan 12, 2026Updated 2 months ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆279Feb 2, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,640Mar 4, 2025Updated last year
- Timeline of Active Directory changes with replication metadata☆522Mar 21, 2025Updated last year
- Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.☆2,923Feb 26, 2026Updated last month
- PowerShell module for Office 365 and Azure log collection☆280Sep 22, 2025Updated 6 months ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆912Dec 17, 2024Updated last year
- A repository for using windows event forwarding for incident detection and response☆1,302Sep 8, 2025Updated 6 months ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆268Feb 3, 2022Updated 4 years ago