xg5-simon / MS-Graph-BlueTeamLinks
MS Graph Commands and Tools for Blue Teamers
☆52Updated last week
Alternatives and similar repositories for MS-Graph-BlueTeam
Users that are interested in MS-Graph-BlueTeam are comparing it to the libraries listed below
Sorting:
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Updated last year
- Baseline a Windows System against LOLBAS☆70Updated last week
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- ☆76Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- ☆31Updated 2 years ago
- Detection rule validation☆40Updated 2 years ago
- DEFCON 31 slide deck and video link☆66Updated 8 months ago
- ☆47Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Updated last week
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Updated 10 months ago
- ☆74Updated last week
- AppLocker Policy Generator☆25Updated 5 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 10 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆34Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Slides of my public talks☆56Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Updated last year
- ☆110Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆46Updated last year
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆48Updated last year
- SQL, IIS, Oh My...☆22Updated 11 months ago