microsoft / Azure-Threat-Research-MatrixLinks
☆75Updated last year
Alternatives and similar repositories for Azure-Threat-Research-Matrix
Users that are interested in Azure-Threat-Research-Matrix are comparing it to the libraries listed below
Sorting:
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- ☆43Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Kerberoast Detection Script☆30Updated 10 months ago
- ☆47Updated 5 months ago
- BloodHound with a twist of cloud☆81Updated 5 years ago
- Extensible Azure Security Tool - Documentation☆82Updated 2 years ago
- Azure AD enumeration over MS Graph☆83Updated 2 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- ☆18Updated 3 years ago
- ☆44Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Slides of my public talks☆56Updated last year
- My conference presentations☆83Updated last month
- Lateral Movement graph for Azure Active Directory☆124Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Audit program for AzureAD☆150Updated 2 years ago
- Memory Forensic System on Cloud☆91Updated last year
- MDE relies on some of the Audit settings to be enabled☆99Updated 3 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆135Updated 2 years ago
- ☆109Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 9 months ago
- ☆139Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Active Directory Purple Team Playbook☆111Updated 2 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated last year
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- ☆175Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago