f-bader / EntraID-ErrorCodesLinks
Entra ID (Azure AD) error codes as JSON
☆16Updated 3 weeks ago
Alternatives and similar repositories for EntraID-ErrorCodes
Users that are interested in EntraID-ErrorCodes are comparing it to the libraries listed below
Sorting:
- ESXi Cyber Security Incident Response Script☆25Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 3 years ago
- Slides of my public talks☆56Updated last year
- A preconfigured Velociraptor triage collector☆56Updated last week
- Velociraptor Server hosted in Azure App Service☆58Updated 5 months ago
- Hunting Queries for Defender ATP☆82Updated last week
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 8 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆111Updated 3 months ago
- ☆74Updated last year
- Full of public notes and Utilities☆129Updated 9 months ago
- ☆104Updated 4 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated 3 months ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆93Updated 4 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆99Updated 3 months ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆66Updated 2 weeks ago
- ☆61Updated 2 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Updated last year
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- ☆47Updated last month
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆28Updated last year
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- ☆22Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- ☆27Updated last month
- Sigma rules to share with the community☆122Updated 9 months ago
- ☆43Updated last week
- This repository is created to store the artifacts for any intrusions I share publicly.☆26Updated 2 years ago
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆92Updated 4 years ago
- Presentations from Conferences☆30Updated last year