microsoft / Azure-Threat-Research-MatrixLinks
☆80Updated last year
Alternatives and similar repositories for Azure-Threat-Research-Matrix
Users that are interested in Azure-Threat-Research-Matrix are comparing it to the libraries listed below
Sorting:
- Extensible Azure Security Tool - Documentation☆83Updated 2 years ago
- ☆43Updated 4 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Lateral Movement graph for Azure Active Directory☆126Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- ☆49Updated 2 weeks ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- BloodHound with a twist of cloud☆82Updated 5 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- Kerberoast Detection Script☆30Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆143Updated 3 years ago
- Reportly is an AzureAD user activity report tool.☆95Updated 2 years ago
- Azure AD Identity Protection Cookie Spoofing☆35Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- M365 Defender SOC Playbooks☆24Updated 2 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 3 years ago
- ☆110Updated 2 years ago
- Audit program for AzureAD☆149Updated 2 years ago
- Azure AD enumeration over MS Graph☆82Updated 3 years ago
- A lab environment for learning about MSTICPy☆38Updated 2 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Updated 2 years ago
- Memory Forensic System on Cloud☆92Updated 2 years ago
- MDE relies on some of the Audit settings to be enabled☆100Updated 3 years ago
- Slides of my public talks☆56Updated 2 years ago
- ☆70Updated 2 years ago
- ☆44Updated 2 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Updated last year
- ☆18Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆10Updated last year