syne0 / ospreyLinks
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
☆16Updated 8 months ago
Alternatives and similar repositories for osprey
Users that are interested in osprey are comparing it to the libraries listed below
Sorting:
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆78Updated 2 weeks ago
- Security Scripts and Sources for daily usage.☆65Updated 3 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆147Updated last week
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆74Updated 6 months ago
- Repository with supporting materials for Invictus Academy/Training☆43Updated 8 months ago
- ☆146Updated last week
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆40Updated 10 months ago
- An index of publicly available and open-source threat detection rulesets.☆124Updated 4 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- ☆44Updated last year
- Mapping of open-source detection rules and atomic tests.☆176Updated 7 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆29Updated last year
- KQL queries for Incident Response☆12Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆138Updated last month
- VirtualGHOST Detection Tool☆92Updated last year
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆264Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆116Updated last week
- ☆74Updated this week
- ☆46Updated last week
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆18Updated last year
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆57Updated last month
- Collection of Microsoft Identity Threat Detection and Response resources.☆49Updated 2 weeks ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆309Updated last month
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆196Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- The purpose of this repository is to share KQL queries to help identify security misconfigurations, hunt for specific patterns, or detect…☆49Updated 3 weeks ago
- A collection of various SIEM rules relating to malware family groups.☆69Updated last year
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆100Updated 2 months ago
- Presentations from Conferences☆29Updated last year