syne0 / ospreyLinks
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
☆17Updated 11 months ago
Alternatives and similar repositories for osprey
Users that are interested in osprey are comparing it to the libraries listed below
Sorting:
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated 3 weeks ago
- Repository with supporting materials for Invictus Academy/Training☆43Updated 11 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆34Updated last year
- Mapping of open-source detection rules and atomic tests.☆189Updated 10 months ago
- KQL queries for Incident Response☆14Updated 2 years ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆98Updated 3 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆152Updated last month
- ☆74Updated last week
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆78Updated 9 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- Security Scripts and Sources for daily usage.☆67Updated 2 weeks ago
- Visualize Microsoft Defender XDR process trees and security events☆33Updated 3 months ago
- VirtualGHOST Detection Tool☆100Updated last week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆50Updated 7 months ago
- ☆45Updated last year
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆39Updated last year
- Elastic version of SOC prime watcher rules☆30Updated last year
- An index of publicly available and open-source threat detection rulesets.☆132Updated 7 months ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆133Updated 2 weeks ago
- The purpose of this repository is to share KQL queries to help identify security misconfigurations, hunt for specific patterns, or detect…☆60Updated last month
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆108Updated 3 weeks ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated 3 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆106Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆161Updated last week
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆28Updated last year
- ☆105Updated 5 months ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated 2 weeks ago
- Presentations from Conferences☆30Updated last year