tomwechsler / Active_Directory_Advanced_Threat_HuntingView external linksLinks
This repo is about Active Directory Advanced Threat Hunting
☆649Feb 17, 2025Updated 11 months ago
Alternatives and similar repositories for Active_Directory_Advanced_Threat_Hunting
Users that are interested in Active_Directory_Advanced_Threat_Hunting are comparing it to the libraries listed below
Sorting:
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆421Aug 10, 2025Updated 6 months ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,431Jan 5, 2026Updated last month
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated 11 months ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,468Dec 31, 2025Updated last month
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,471Jan 23, 2026Updated 3 weeks ago
- Active Directory Auditing and Enumeration☆515Dec 3, 2025Updated 2 months ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆622Dec 20, 2024Updated last year
- PowerShell tools to help defenders hunt smarter, hunt harder.☆457Oct 29, 2025Updated 3 months ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,634Updated this week
- PowerShell Digital Forensics & Incident Response Scripts.☆766Jan 14, 2026Updated last month
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆573Dec 6, 2025Updated 2 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆310Oct 23, 2025Updated 3 months ago
- Documentation and scripts to properly enable Windows event logs.☆671Oct 3, 2025Updated 4 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,048Dec 11, 2024Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 8 months ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆487Apr 17, 2025Updated 9 months ago
- Windows Local Privilege Escalation Cookbook☆1,266Feb 5, 2026Updated last week
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆318Mar 27, 2025Updated 10 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆259Jan 23, 2026Updated 3 weeks ago
- ResearchDev - XDR & SIEM Detection☆67Apr 16, 2025Updated 9 months ago
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆450Jun 16, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,924Jan 20, 2026Updated 3 weeks ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,133Nov 11, 2025Updated 3 months ago
- Dominate Active Directory with PowerShell.☆1,162Nov 28, 2025Updated 2 months ago
- Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the …☆4,119Updated this week
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆611Jul 31, 2025Updated 6 months ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆754Aug 28, 2025Updated 5 months ago
- Manage Azure and Microsoft 365 with the Microsoft Graph PowerShell SDK!☆79Aug 29, 2024Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,249Jul 22, 2025Updated 6 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last week
- ☆843Jan 12, 2026Updated last month
- An ADCS honeypot to catch attackers in your internal network.☆324Jun 27, 2024Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆157Dec 10, 2025Updated 2 months ago
- Some scripts to abuse kerberos using Powershell☆355Jul 27, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,149Updated this week
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆886Updated this week
- Everything about Active Directory in a hybrid infrastructure!☆27Dec 31, 2022Updated 3 years ago