microsoft / Azure-Threat-Research-MatrixLinks
☆76Updated last year
Alternatives and similar repositories for Azure-Threat-Research-Matrix
Users that are interested in Azure-Threat-Research-Matrix are comparing it to the libraries listed below
Sorting:
- Extensible Azure Security Tool - Documentation☆83Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- ☆47Updated 3 weeks ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- ☆43Updated 4 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆142Updated 3 years ago
- BloodHound with a twist of cloud☆81Updated 5 years ago
- Active Directory Purple Team Playbook☆113Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 11 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- ☆173Updated 2 years ago
- Slides of my public talks☆56Updated last year
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- Lateral Movement graph for Azure Active Directory☆124Updated 2 years ago
- Kerberoast Detection Script☆30Updated last year
- Reportly is an AzureAD user activity report tool.☆94Updated 2 years ago
- ☆70Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- Audit program for AzureAD☆149Updated 2 years ago
- ☆18Updated 3 years ago
- MDE relies on some of the Audit settings to be enabled☆100Updated 3 years ago
- ☆25Updated 3 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Updated 2 years ago
- ☆110Updated 2 years ago
- ☆44Updated 4 months ago
- My conference presentations☆85Updated last month
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated 2 years ago