mandiant / Mandiant-Azure-AD-InvestigatorLinks
☆636Updated 2 years ago
Alternatives and similar repositories for Mandiant-Azure-AD-Investigator
Users that are interested in Mandiant-Azure-AD-Investigator are comparing it to the libraries listed below
Sorting:
- Contact: CRT@crowdstrike.com☆741Updated 2 years ago
- Understand adversary tradecraft and improve detection strategies☆714Updated 2 years ago
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆282Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆326Updated 8 months ago
- Microsoft Sentinel2Go is an open source project developed to expedite the deployment of a Microsoft Sentinel research lab.☆574Updated 8 months ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆788Updated 2 years ago
- MDATP☆460Updated last year
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆592Updated 6 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,426Updated 2 years ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆888Updated 6 months ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆237Updated 5 years ago
- PowerShell framework to assess Azure security☆1,227Updated last year
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 4 years ago
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆443Updated 2 years ago
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,191Updated 3 weeks ago
- Atomic Purple Team Framework and Lifecycle☆298Updated 4 years ago
- Microsoft Sentinel SOC Operations☆261Updated last year
- Unlocking Serverless Computing to Assess Security Controls☆259Updated last year
- A PowerShell script that automates the security assessment of Microsoft 365 environments.☆630Updated 5 months ago
- Hunting queries and detections☆838Updated 2 weeks ago
- ☆615Updated 2 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆426Updated 10 months ago
- KQL queries for Advanced Hunting☆175Updated 5 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,073Updated 10 months ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,657Updated last year
- EventList☆377Updated 4 years ago
- Tooling for assessing an Azure AD tenant state and configuration☆818Updated last year
- Security auditing tool for Azure environments☆582Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆855Updated 3 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated last year