syne0 / ospreyLinks
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
☆17Updated last year
Alternatives and similar repositories for osprey
Users that are interested in osprey are comparing it to the libraries listed below
Sorting:
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆83Updated last month
- Repository with supporting materials for Invictus Academy/Training☆43Updated last year
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆152Updated 2 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Updated last year
- Security Scripts and Sources for daily usage.☆69Updated 3 weeks ago
- KQL queries for Incident Response☆14Updated 2 years ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆12Updated 2 weeks ago
- Visualize Microsoft Defender XDR process trees and security events☆33Updated 4 months ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆40Updated last year
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- ☆45Updated last year
- Mapping of open-source detection rules and atomic tests.☆193Updated last year
- VirtualGHOST Detection Tool☆101Updated last month
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated last month
- ☆74Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated 2 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆60Updated 5 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Updated 9 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Updated last year
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆19Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆136Updated last month
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆214Updated this week
- Elastic version of SOC prime watcher rules☆30Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆50Updated 8 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- A preconfigured Velociraptor triage collector☆73Updated 2 weeks ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated last month
- Miscellaneous stuff I create☆50Updated this week
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆98Updated 4 months ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆67Updated last month