Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
☆1,428Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for Sparrow
Users that are interested in Sparrow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contact: CRT@crowdstrike.com☆751Apr 27, 2023Updated 2 years ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆930Mar 9, 2026Updated last month
- ☆646Jun 6, 2023Updated 2 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆788Oct 29, 2022Updated 3 years ago
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,522Apr 9, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of scripts for assessing Microsoft Azure security☆2,344Mar 15, 2026Updated last month
- Cybersecurity Evaluation Tool☆1,805Apr 9, 2026Updated last week
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,698Jan 8, 2024Updated 2 years ago
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,057Feb 17, 2022Updated 4 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,081Nov 28, 2024Updated last year
- A DFIR tool written in Python.☆1,054Jun 9, 2021Updated 4 years ago
- PowerShell framework to assess Azure security☆1,268Oct 18, 2025Updated 5 months ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆952Feb 11, 2026Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,380Apr 8, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆5,574Updated this week
- ☆2,666Mar 5, 2024Updated 2 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,582Feb 5, 2026Updated 2 months ago
- Six Degrees of Domain Admin☆10,534Mar 2, 2026Updated last month
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,503Apr 3, 2026Updated last week
- A repository of sysmon configuration modules☆3,016Aug 21, 2024Updated last year
- Bloodhound Reporting for Blue and Purple Teams☆1,282Nov 15, 2025Updated 5 months ago
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆452Jun 16, 2023Updated 2 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,391Feb 10, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,304Jun 1, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,277Jan 21, 2026Updated 2 months ago
- ☆2,397Oct 14, 2023Updated 2 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,939Jul 6, 2024Updated last year
- MDATP☆455Jul 20, 2024Updated last year
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆591Jan 22, 2025Updated last year
- Sysmon configuration file template with default high-quality event tracing☆5,468Jul 3, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,534Jan 12, 2026Updated 3 months ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆279Feb 2, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,652Updated this week
- Timeline of Active Directory changes with replication metadata☆522Mar 21, 2025Updated last year
- Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.☆2,927Feb 26, 2026Updated last month
- PowerShell module for Office 365 and Azure log collection☆280Sep 22, 2025Updated 6 months ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆911Dec 17, 2024Updated last year
- A repository for using windows event forwarding for incident detection and response☆1,310Sep 8, 2025Updated 7 months ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆269Feb 3, 2022Updated 4 years ago