syne0 / ospreyLinks
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
☆17Updated 10 months ago
Alternatives and similar repositories for osprey
Users that are interested in osprey are comparing it to the libraries listed below
Sorting:
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆82Updated this week
- BlackCat is a PowerShell module designed to validate the security of Microsoft Azure. It provides a set of functions to identify potentia…☆152Updated 2 weeks ago
- Repository with supporting materials for Invictus Academy/Training☆43Updated 10 months ago
- Mapping of open-source detection rules and atomic tests.☆185Updated 10 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆32Updated last year
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆96Updated 2 months ago
- Security Scripts and Sources for daily usage.☆67Updated last month
- An index of publicly available and open-source threat detection rulesets.☆129Updated 7 months ago
- ☆74Updated this week
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆126Updated 2 months ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆39Updated last year
- VirtualGHOST Detection Tool☆96Updated last year
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆77Updated 8 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆18Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- ☆44Updated last year
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆317Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- KQL queries for Incident Response☆12Updated 2 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated 3 weeks ago
- Halberd : Multi-Cloud Agentic Attack Tool☆321Updated last week
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆28Updated 11 months ago
- Visualize Microsoft Defender XDR process trees and security events☆33Updated 2 months ago
- Elastic version of SOC prime watcher rules☆30Updated last year
- ☆104Updated 4 months ago
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆107Updated 2 weeks ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆49Updated 6 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆155Updated 3 weeks ago