This repo is about Active Directory Advanced Threat Hunting
☆648Feb 17, 2025Updated last year
Alternatives and similar repositories for Active_Directory_Advanced_Threat_Hunting
Users that are interested in Active_Directory_Advanced_Threat_Hunting are comparing it to the libraries listed below
Sorting:
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,475Feb 18, 2026Updated 2 weeks ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆432Feb 18, 2026Updated 2 weeks ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆816Feb 17, 2025Updated last year
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,478Dec 31, 2025Updated 2 months ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,475Jan 23, 2026Updated last month
- Active Directory Auditing and Enumeration☆521Dec 3, 2025Updated 3 months ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆624Feb 16, 2026Updated 2 weeks ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆473Oct 29, 2025Updated 4 months ago
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,642Feb 27, 2026Updated last week
- PowerShell Digital Forensics & Incident Response Scripts.☆772Jan 14, 2026Updated last month
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆577Dec 6, 2025Updated 3 months ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆314Feb 16, 2026Updated 2 weeks ago
- Documentation and scripts to properly enable Windows event logs.☆673Oct 3, 2025Updated 5 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,056Dec 11, 2024Updated last year
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆486Apr 17, 2025Updated 10 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 9 months ago
- Windows Local Privilege Escalation Cookbook☆1,281Feb 5, 2026Updated last month
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆320Mar 27, 2025Updated 11 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆257Jan 23, 2026Updated last month
- ResearchDev - XDR & SIEM Detection☆67Apr 16, 2025Updated 10 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,930Jan 20, 2026Updated last month
- The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Produc…☆451Jun 16, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,140Feb 21, 2026Updated 2 weeks ago
- Dominate Active Directory with PowerShell.☆1,166Nov 28, 2025Updated 3 months ago
- Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the …☆4,149Updated this week
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆758Aug 28, 2025Updated 6 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆615Jul 31, 2025Updated 7 months ago
- Manage Azure and Microsoft 365 with the Microsoft Graph PowerShell SDK!☆80Aug 29, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,256Jul 22, 2025Updated 7 months ago
- ☆848Jan 12, 2026Updated last month
- An ADCS honeypot to catch attackers in your internal network.☆324Jun 27, 2024Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆157Feb 19, 2026Updated 2 weeks ago
- Some scripts to abuse kerberos using Powershell☆355Jul 27, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,158Updated this week
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Updated this week
- Everything about Active Directory in a hybrid infrastructure!☆27Dec 31, 2022Updated 3 years ago