xephora / Threat-Remediation-ScriptsLinks
This repository contains a list of new remediation scripts.
☆167Updated 2 weeks ago
Alternatives and similar repositories for Threat-Remediation-Scripts
Users that are interested in Threat-Remediation-Scripts are comparing it to the libraries listed below
Sorting:
- PowerShell module for SentinelOne API☆69Updated 2 years ago
- PowerShell Module for checking SPF, DKIM and DMARC-record.☆65Updated last week
- ☆82Updated last year
- ☆362Updated 3 weeks ago
- This module allows the creation of password expiry emails for users, managers, administrators, and security according to defined template…☆157Updated 9 months ago
- AD Scripts☆418Updated last week
- PowerShell for CrowdStrike's OAuth2 APIs☆447Updated last week
- ☆50Updated last year
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆136Updated last year
- Sysmon configuration file templates with advanced event tracing and blocking☆41Updated 2 weeks ago
- This script will enable you to reset the krbtgt account password and related keys while minimizing the likelihood of Kerberos authenticat…☆454Updated last year
- Perform general security checks against AD environment☆66Updated 3 years ago
- Repository for Software Certs for easy software blocking across corp environments, for example, using MDE IOC☆64Updated last week
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆266Updated 3 years ago
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆146Updated last month
- A PowerShell module for incident response and threat hunting.☆38Updated last year
- Simple hunting script for suspicious M365 OAuth Apps☆319Updated 4 months ago
- M365 MDATP Live Response sample scripts☆82Updated last year
- FBPro Audit Test Automation Package allows you to create compliance reports for your systems. The resulting HTML-reports provide a transp…☆158Updated last week
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆277Updated 4 years ago
- Active Directory's Health Check script that generates a full HTML report of the environment's health, security and status based on Micros…☆123Updated last year
- Collection of Group Policy Templates to accelerate implementing ACSC Essential 8☆48Updated 2 years ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆571Updated last month
- Sample queries for Advanced hunting in Microsoft Defender ATP☆38Updated 4 years ago
- Intune managed Secured workstation☆258Updated last year
- Protect your data in minutes !☆126Updated last year
- Repository of SentinelOne Deep Visibility queries.☆135Updated 4 years ago
- ☆39Updated 3 months ago
- ☆38Updated last year
- Real-time Response scripts and schema☆121Updated 3 months ago