mandiant / Mandiant-Azure-AD-Investigator
☆617Updated last year
Alternatives and similar repositories for Mandiant-Azure-AD-Investigator:
Users that are interested in Mandiant-Azure-AD-Investigator are comparing it to the libraries listed below
- Contact: CRT@crowdstrike.com☆709Updated last year
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆771Updated 2 years ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆732Updated this week
- Building environments to replicate small networks and deploy applications☆317Updated last year
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,420Updated 2 years ago
- MDATP☆456Updated 5 months ago
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆279Updated 2 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,063Updated last month
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆556Updated last year
- PowerShell framework to assess Azure security☆1,130Updated 4 months ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆867Updated last week
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆427Updated last year
- A PowerShell script that automates the security assessment of Microsoft 365 environments.☆596Updated 2 months ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆547Updated last month
- Hunting queries and detections☆742Updated 4 months ago
- EventList☆371Updated 3 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,138Updated 3 months ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆878Updated last month
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆516Updated 3 weeks ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆837Updated 2 years ago
- Tools for hunting for threats.☆572Updated 2 months ago
- Sample queries for Advanced hunting in Microsoft 365 Defender☆1,953Updated 2 years ago
- ☆611Updated last year
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆464Updated last month
- Microsoft Sentinel SOC Operations☆244Updated 6 months ago
- Tooling for assessing an Azure AD tenant state and configuration☆765Updated 7 months ago
- Atomic Purple Team Framework and Lifecycle☆284Updated 3 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆411Updated last month
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,563Updated last year
- Understand adversary tradecraft and improve detection strategies☆707Updated last year