microsoft / Azure-Threat-Research-Matrix
☆73Updated 8 months ago
Alternatives and similar repositories for Azure-Threat-Research-Matrix:
Users that are interested in Azure-Threat-Research-Matrix are comparing it to the libraries listed below
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆38Updated 3 years ago
- ☆41Updated 3 years ago
- Extensible Azure Security Tool - Documentation☆81Updated last year
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- ☆46Updated 3 weeks ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- Slides of my public talks☆54Updated last year
- BloodHound with a twist of cloud☆76Updated 4 years ago
- ASR Configurator, Essentials and Atomic Testing☆36Updated 3 months ago
- ☆44Updated last month
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆102Updated 9 months ago
- ☆13Updated 4 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 2 months ago
- Azure AD enumeration over MS Graph☆80Updated 2 years ago
- Kerberoast Detection Script☆30Updated 3 months ago
- ☆22Updated 2 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- M365 Defender SOC Playbooks☆22Updated 2 years ago
- Azure AD Identity Protection Cookie Spoofing☆31Updated last year
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆59Updated this week
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Audit program for AzureAD☆145Updated last year
- Tools for attacking Azure Function Apps☆68Updated 3 months ago
- ☆106Updated 2 years ago
- ☆49Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆86Updated last year
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 6 months ago