Azure AD Incident Response
☆28Oct 8, 2021Updated 4 years ago
Alternatives and similar repositories for Azure-AD-Incident-Response
Users that are interested in Azure-AD-Incident-Response are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Microsoft Sentinel SOC Operations☆265Jul 10, 2024Updated last year
- Guides, articles, and a lot of Azure Monitor information☆38Apr 18, 2021Updated 5 years ago
- ☆18Jul 20, 2024Updated last year
- ☆17Apr 25, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- ☆17Aug 27, 2022Updated 3 years ago
- Notes on responding to security breaches relating to Azure AD☆123Mar 14, 2022Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated 2 months ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- Governor Sharing☆11Mar 18, 2025Updated last year
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆108Mar 12, 2026Updated last month
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Jan 18, 2020Updated 6 years ago
- Defender for Endpoint☆28Mar 28, 2026Updated last month
- KQL for Azure Resource Manager and AppID search☆23Aug 15, 2024Updated last year
- USN Journal full path builder☆69Apr 16, 2026Updated 3 weeks ago
- Automate Azure subscription check against CIS Benchmark☆22Jun 29, 2018Updated 7 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Sentinel Threat Intelligence Upload Toolkit☆18Jul 15, 2024Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- This project contains samples how to use MDATP API for integration with other systems and products☆29Dec 22, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- PowerShell Script for Agentless Incident Response☆25Apr 5, 2018Updated 8 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Audit program for AzureAD☆151May 31, 2023Updated 2 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Mar 10, 2023Updated 3 years ago
- Microsoft Cloud App Security labs☆14Dec 17, 2018Updated 7 years ago
- ☆19Sep 3, 2021Updated 4 years ago
- ☆45May 2, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- view RedFlagDeals.com from the command line☆10Jul 6, 2024Updated last year
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆17Apr 14, 2025Updated last year
- Powershell Scripts to automatically deploy an image of a prebuilt VM (up-to-date and with pre-deployed tools and apps) to every region yo…☆20Jun 27, 2023Updated 2 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆40Jun 6, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Phishing Reverse Proxy with MFA bypass☆18Jan 28, 2023Updated 3 years ago