soteria-security / HAFNIUM-IOC
A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865
☆21Updated 3 years ago
Related projects: ⓘ
- Build a domain with three quick PowerShell scripts!☆28Updated 4 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆50Updated last year
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆30Updated 7 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated 8 months ago
- Looks up permissions within Active Directory on a target (OU or Computer) to determine access to LAPS attributes (ms-Mcs-AdmPwdExpiration…☆15Updated last year
- Active Directory Toolkit☆20Updated 5 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 8 years ago
- Module to update the Krbtgt password☆45Updated 10 months ago
- ☆14Updated this week
- ☆16Updated 2 years ago
- Azure AD Incident Response☆24Updated 2 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆24Updated last year
- BloodHound Data Scanner☆43Updated 4 years ago
- Threat Mitigation Strategies☆23Updated last year
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆52Updated 3 years ago
- ☆105Updated 5 years ago
- AD Live changes viewer☆35Updated last year
- ☆13Updated 3 years ago
- ☆13Updated this week
- Azure AD Identity Protection Cookie Spoofing☆30Updated last year
- ☆11Updated 3 years ago
- ☆14Updated 5 months ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆9Updated 3 months ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆59Updated 9 months ago
- Leghorn code for PKI abuse☆31Updated 3 years ago
- ☆22Updated 2 years ago
- Active Directory Group Policy analyzer☆13Updated 5 years ago
- Automated forensics written in PowerShell☆32Updated 4 years ago