labyrinthinesecurity / silhouetteLinks
An Azure SPN access minimizer
☆44Updated this week
Alternatives and similar repositories for silhouette
Users that are interested in silhouette are comparing it to the libraries listed below
Sorting:
- Microsoft Entra ID App Audit Solution (AADAppAudit)☆84Updated last year
- ☆53Updated 4 months ago
- ☆35Updated last year
- Check you Sentinel environment using Pester infrastructure tests☆31Updated 2 years ago
- Community project to classify, identify and protect your privileges based on Enterprise Access Model (EAM)☆196Updated this week
- Sentinel Recon Tools Workbook☆13Updated 3 years ago
- Docs and samples for privileged identity and access management in Microsoft Azure and Microsoft Entra.☆182Updated this week
- ☆36Updated 2 months ago
- various tools for Microsoft Sentinel☆32Updated 6 months ago
- ☆30Updated 5 months ago
- Sentinel Analytics Rule converter PowerShell module☆66Updated last month
- ☆34Updated 2 months ago
- ☆50Updated 2 months ago
- Rapid MDC deployments☆22Updated 2 years ago
- Solutions developed by the MDEASM Customer Experience Engineering (CxE) Go-To Production (GTP) team for Azure MDEASM☆29Updated 11 months ago
- Everything about Microsoft Cloud Security!☆55Updated last year
- ☆27Updated last year
- ☆34Updated 2 years ago
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆89Updated 2 years ago
- Automatic Microsoft Sentinel Deployment☆16Updated 9 months ago
- Assess Azure Security State☆38Updated last year
- Microsoft Entra ID Governance Training and Learning Resources☆90Updated 2 weeks ago
- MDE Quickstart is a battle-tested MDE policy set designed to be restored with Intune Backup & Restore☆65Updated 3 years ago
- Sharing my KQL queries for Azure Sentinel☆199Updated this week
- KQL example queries for working in Azure☆35Updated last month
- Tool for creating reports on Entra ID Role Assignments☆100Updated last year
- Utilities for Microsoft Sentinel☆20Updated last month
- ☆63Updated this week
- ☆59Updated last year
- Scan Entra for risk in role assignments and escalation paths☆62Updated last month