mdecrevoisier / Windows-auditing-baselineView external linksLinks
Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.
☆60Jun 9, 2025Updated 8 months ago
Alternatives and similar repositories for Windows-auditing-baseline
Users that are interested in Windows-auditing-baseline are comparing it to the libraries listed below
Sorting:
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22May 21, 2022Updated 3 years ago
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆24Jul 27, 2025Updated 6 months ago
- ☆49Updated this week
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆20Jul 1, 2023Updated 2 years ago
- ☆59Dec 10, 2025Updated 2 months ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆21Jan 5, 2025Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,089Nov 8, 2025Updated 3 months ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆136Sep 28, 2024Updated last year
- ☆22Mar 4, 2025Updated 11 months ago
- A PowerShell OSD wizard created based on the MDT UDI Wizard functionality☆21May 15, 2025Updated 9 months ago
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆39Oct 20, 2025Updated 3 months ago
- ☆38Mar 4, 2020Updated 5 years ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆318Mar 27, 2025Updated 10 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆613Dec 8, 2025Updated 2 months ago
- Active Directory V3 Documentation Script☆42Sep 15, 2025Updated 5 months ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- Documentation and scripts to properly enable Windows event logs.☆671Oct 3, 2025Updated 4 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆126Dec 2, 2023Updated 2 years ago
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆78Updated this week
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆13Jun 3, 2025Updated 8 months ago
- ☆61Jun 24, 2023Updated 2 years ago
- Detect and move orphaned patches from "C:\Windows\Installer" using this PowerShell module☆24Mar 7, 2018Updated 7 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆486Apr 17, 2025Updated 9 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- This is a powershell module to help implement the AD Tier Model☆14Dec 26, 2025Updated last month
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 5 months ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago