markeytos / CloudWatcherLinks
Checks our resources to monitor Identity Changes
☆17Updated last week
Alternatives and similar repositories for CloudWatcher
Users that are interested in CloudWatcher are comparing it to the libraries listed below
Sorting:
- Find accounts using common and default passwords in Active Directory.☆70Updated 6 years ago
- KITT - An Open Source PowerShell O365 Business Email Compromise Investigation Tool☆116Updated 5 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆160Updated 5 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆78Updated 5 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆116Updated last month
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆265Updated last year
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- A series of scripts☆101Updated 4 years ago
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆62Updated last year
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 7 years ago
- PowerShell Module to interact with VirusTotal☆122Updated 5 years ago
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆37Updated 2 years ago
- Network Appliance Backups in PowerShell☆29Updated 2 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- ☆21Updated 4 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 7 months ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆160Updated 2 years ago
- ☆67Updated 4 years ago
- ☆45Updated 2 years ago
- HIBP Audit - Audit Active Directory user accounts against HIBP☆15Updated 4 years ago
- Defensive Origins Training Schedule☆39Updated last year
- A few scripts I put together to send and receive data from an Azure Log Analytics workspace leveraging the Azure Monitor HTTP Data Collec…☆22Updated 2 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆63Updated last year
- Purple Team Security☆75Updated 3 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Updated 4 years ago
- A repo for documents containing curated list of health and (in the future security) checks to be run against a Windows Active-Directory d…☆167Updated 6 years ago