microsoft / Azure-Threat-Research-Matrix
☆71Updated 7 months ago
Alternatives and similar repositories for Azure-Threat-Research-Matrix:
Users that are interested in Azure-Threat-Research-Matrix are comparing it to the libraries listed below
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆36Updated 3 years ago
- ☆40Updated 3 years ago
- Extensible Azure Security Tool - Documentation☆81Updated last year
- Kerberoast Detection Script☆30Updated 2 months ago
- ☆22Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆64Updated last month
- ☆45Updated last week
- GoldenSAML Attack Libraries and Framework☆67Updated 7 months ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- Azure AD Identity Protection Cookie Spoofing☆31Updated last year
- ☆13Updated 4 years ago
- My conference presentations☆66Updated last year
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆89Updated 2 years ago
- Azure AD enumeration over MS Graph☆80Updated 2 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆102Updated 8 months ago
- ASR Configurator, Essentials and Atomic Testing☆36Updated 2 months ago
- Tools for attacking Azure Function Apps☆67Updated 2 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆57Updated this week
- ☆14Updated 3 years ago
- BloodHound with a twist of cloud☆76Updated 4 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Slides of my public talks☆48Updated last year
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆39Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- ☆48Updated last year
- A lab environment for learning about MSTICPy☆36Updated last year
- ☆106Updated last year