xephora / Threat-Remediation-ScriptsLinks
This repository contains a list of new remediation scripts.
☆124Updated last week
Alternatives and similar repositories for Threat-Remediation-Scripts
Users that are interested in Threat-Remediation-Scripts are comparing it to the libraries listed below
Sorting:
- PowerShell module for SentinelOne API☆66Updated last year
- ☆269Updated last week
- This module allows the creation of password expiry emails for users, managers, administrators, and security according to defined template…☆153Updated last month
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆263Updated 3 years ago
- PowerShell Module for checking SPF, DKIM and DMARC-record.☆60Updated last week
- Scripts that are useful in the NinjaOne NinjaRMM, although many are useful or usable with other systems or directly on a machine with lit…☆32Updated last week
- ☆48Updated 11 months ago
- A collection of useful scripts for NinjaOne☆42Updated 2 weeks ago
- AD Scripts☆316Updated 3 months ago
- Simple hunting script for suspicious M365 OAuth Apps☆284Updated 3 months ago
- A PowerShell script that automates the security assessment of Microsoft Active Directory environments.☆65Updated 2 years ago
- This module provides an easy way to cleanup Active Directory from dead/old objects based on various criteria. It can also disable, move o…☆108Updated 2 months ago
- Active Directory's Health Check script that generates a full HTML report of the environment's health, security and status based on Micros…☆105Updated 9 months ago
- ☆74Updated last year
- Sysmon configuration file templates with advanced event tracing and blocking☆40Updated last week
- A Windows CIS benchmark policy compliance auditor☆51Updated last year
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆113Updated 8 months ago
- ☆97Updated 4 months ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆255Updated 4 years ago
- Perform general security checks against AD environment☆67Updated 3 years ago
- The Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA)☆334Updated 11 months ago
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆115Updated 4 months ago
- Repository of SentinelOne Deep Visibility queries.☆127Updated 3 years ago
- ☆33Updated 5 months ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆474Updated last week
- PowerShell for CrowdStrike's OAuth2 APIs☆413Updated last week
- Microsoft 365 Security Assessment Tool - A Easy-To-Use Microsoft 365 Security Assessment Tool☆119Updated last month
- Maintain Tier 0 users. This script take care all Tier 0 users are in the correct OU or in the default user container and add the Kerberos…☆64Updated 2 months ago
- ☆112Updated 10 months ago
- Intune managed Secured workstation☆247Updated 9 months ago