mandiant / Mandiant-Azure-AD-InvestigatorLinks
☆640Updated 2 years ago
Alternatives and similar repositories for Mandiant-Azure-AD-Investigator
Users that are interested in Mandiant-Azure-AD-Investigator are comparing it to the libraries listed below
Sorting:
- Contact: CRT@crowdstrike.com☆742Updated 2 years ago
- Understand adversary tradecraft and improve detection strategies☆713Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆327Updated 9 months ago
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆282Updated 2 years ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,425Updated 2 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆789Updated 2 years ago
- MDATP☆459Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆890Updated 7 months ago
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆573Updated 9 months ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆601Updated 7 months ago
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆448Updated 2 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆237Updated 5 years ago
- A PowerShell script that automates the security assessment of Microsoft 365 environments.☆633Updated 6 months ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated last year
- Deploy customizable Active Directory labs in Azure - automatically.☆427Updated 10 months ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,073Updated 10 months ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,197Updated last month
- PowerShell framework to assess Azure security☆1,236Updated last week
- Hunting queries and detections☆838Updated last month
- EventList☆377Updated 4 years ago
- Microsoft Sentinel SOC Operations☆262Updated last year
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆486Updated 11 months ago
- Windows OS Hardening with PowerShell DSC☆283Updated last year
- Tooling for assessing an Azure AD tenant state and configuration☆819Updated last year
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆287Updated 4 years ago
- Atomic Purple Team Framework and Lifecycle☆298Updated 4 years ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆723Updated last week
- All sysmon event types and their fields explained☆557Updated 3 years ago
- ☆615Updated 2 years ago
- KQL queries for Advanced Hunting☆176Updated 5 years ago