microsoft / Azure-Threat-Research-MatrixLinks
☆75Updated last year
Alternatives and similar repositories for Azure-Threat-Research-Matrix
Users that are interested in Azure-Threat-Research-Matrix are comparing it to the libraries listed below
Sorting:
- Extensible Azure Security Tool - Documentation☆82Updated 2 years ago
- ☆43Updated 4 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- ☆13Updated 4 years ago
- ☆47Updated 2 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Updated last year
- Audit program for AzureAD☆149Updated 2 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- ☆108Updated 2 years ago
- ☆25Updated 3 years ago
- MDE relies on some of the Audit settings to be enabled☆98Updated 2 years ago
- Kerberoast Detection Script☆30Updated 7 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 6 months ago
- BloodHound with a twist of cloud☆81Updated 4 years ago
- Reportly is an AzureAD user activity report tool.☆95Updated last year
- Tools for attacking Azure Function Apps☆82Updated 7 months ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆92Updated 2 months ago
- ☆49Updated last year
- GoldenSAML Attack Libraries and Framework☆73Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Silver SAML forgery tool☆52Updated last year
- ☆150Updated 3 years ago
- Azure AD Identity Protection Cookie Spoofing☆33Updated last year
- M365 Defender SOC Playbooks☆24Updated 2 years ago
- Presentations from Conferences☆29Updated 9 months ago