jangeisbauer / gundogLinks
gundog - guided hunting in Microsoft Defender
☆52Updated 4 years ago
Alternatives and similar repositories for gundog
Users that are interested in gundog are comparing it to the libraries listed below
Sorting:
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- ☆42Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- Random tips and tricks RE: ransomware☆14Updated 3 years ago
- ☆47Updated last month
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- ☆41Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- ☆27Updated 4 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- ASR Configurator, Essentials and Atomic Testing☆42Updated last month
- Windows Security Logging☆43Updated 2 years ago
- Kerberoast Detection Script☆30Updated 7 months ago
- ☆29Updated 4 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Jupyter notebooks☆25Updated 4 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆14Updated last year
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- An exercise to practice deobfuscating PowerShell Scripts.☆28Updated 2 years ago
- Presentations☆17Updated 2 years ago
- ☆21Updated 3 years ago
- ☆42Updated last year
- ☆25Updated 3 years ago