mandiant / citrix-ioc-scanner-cve-2023-3519
☆65Updated last year
Alternatives and similar repositories for citrix-ioc-scanner-cve-2023-3519:
Users that are interested in citrix-ioc-scanner-cve-2023-3519 are comparing it to the libraries listed below
- A tiny tool to find and fix common misconfigurations in Active Directory-integrated DNS☆107Updated this week
- ☆50Updated last year
- Hunting Queries for Defender ATP☆77Updated 2 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆82Updated 5 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆70Updated this week
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆102Updated last month
- Pushes Sysmon Configs☆89Updated 3 years ago
- A tiny tool built to help AD Admins safely utilize the Protected Users group.☆35Updated this week
- ☆41Updated last year
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆50Updated this week
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆92Updated 3 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆110Updated 5 months ago
- ☆27Updated 4 months ago
- Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.☆78Updated 5 months ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated 9 months ago
- The Invoke-TrimarcADChecks.ps1 PowerShell script is designed to gather data from a single domain AD forest based on our similar checks pe…☆41Updated last year
- ☆70Updated 2 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆184Updated this week
- A collection of various SIEM rules relating to malware family groups.☆64Updated 7 months ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆60Updated last week
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆87Updated 4 years ago
- Notes on responding to security breaches relating to Azure AD☆97Updated 2 years ago
- Content Repo for Demystifying KQL Tutorial Series☆66Updated 4 months ago
- ☆41Updated 9 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆82Updated 2 months ago
- A PowerShell script that automates the security assessment of Microsoft Active Directory environments.☆63Updated 2 years ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆93Updated 4 months ago
- ResearchDev - XDR & SIEM Detection☆61Updated last month
- Table of AD and Azure assets and whether they belong to Tier Zero☆205Updated last month