syne0 / ospreyLinks
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
☆16Updated 7 months ago
Alternatives and similar repositories for osprey
Users that are interested in osprey are comparing it to the libraries listed below
Sorting:
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 2 months ago
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆135Updated this week
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- ☆144Updated last week
- Mapping of open-source detection rules and atomic tests.☆175Updated 7 months ago
- Security Scripts and Sources for daily usage.☆65Updated 2 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆100Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆76Updated last year
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆28Updated 11 months ago
- ☆74Updated this week
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆307Updated 3 weeks ago
- Repository with supporting materials for Invictus Academy/Training☆43Updated 7 months ago
- VirtualGHOST Detection Tool☆92Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆196Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- ☆45Updated last year
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆18Updated last year
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆40Updated 9 months ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆17Updated last month
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆130Updated 3 weeks ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆74Updated 6 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆48Updated this week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆104Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆303Updated last month
- Elastic version of SOC prime watcher rules☆29Updated 10 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆144Updated 2 weeks ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆192Updated 10 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆48Updated 4 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆27Updated 9 months ago