☆83Jun 17, 2024Updated last year
Alternatives and similar repositories for Azure-Threat-Research-Matrix
Users that are interested in Azure-Threat-Research-Matrix are comparing it to the libraries listed below
Sorting:
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Sharing my KQL queries for Azure Sentinel☆208Feb 9, 2026Updated 3 weeks ago
- ☆38Jan 3, 2022Updated 4 years ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,475Dec 31, 2025Updated 2 months ago
- Abuse Azure API permissions for red teaming☆71Jan 24, 2023Updated 3 years ago
- MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).☆414Jan 13, 2026Updated last month
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- ☆77Feb 4, 2026Updated last month
- ☆12Mar 31, 2021Updated 4 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- ☆16Updated this week
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- BloodHound Attack Research Kit☆586Mar 18, 2025Updated 11 months ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Oct 20, 2015Updated 10 years ago
- A simple Impacket-based tool to check a set of credentials against many Windows hosts and get permission for SMB shares.☆13Dec 26, 2025Updated 2 months ago
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- ☆10May 25, 2023Updated 2 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Feb 23, 2024Updated 2 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆394Feb 9, 2026Updated 3 weeks ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- ☆614Jun 1, 2023Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago
- OSCP - Study☆13Aug 18, 2021Updated 4 years ago
- Azure Function for the Microsoft Sentinel Triage AssistanT (STAT)☆15Dec 17, 2025Updated 2 months ago
- 🕵️♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️☆36Dec 18, 2022Updated 3 years ago
- Allows swapping out IoC containers without rewriting registration or resolve code.☆14Jan 23, 2021Updated 5 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Think of this PS-module as a helper for Microsoft Graph version-management, connectivity and data management using Microsoft Graph.☆14Apr 28, 2025Updated 10 months ago