MS Graph Commands and Tools for Blue Teamers
☆51Feb 4, 2026Updated last month
Alternatives and similar repositories for MS-Graph-BlueTeam
Users that are interested in MS-Graph-BlueTeam are comparing it to the libraries listed below
Sorting:
- ☆18Mar 26, 2024Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- ☆35Nov 11, 2025Updated 3 months ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Hunting Queries for Defender ATP☆83Dec 14, 2025Updated 2 months ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated last year
- ☆20Jan 9, 2024Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A PowerShell incident response script for quick triage☆81Jul 18, 2022Updated 3 years ago
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Oct 23, 2023Updated 2 years ago
- Everything you need to prepare for the Microsoft 365 Certified: Endpoint Administrator Associate!☆26Dec 16, 2023Updated 2 years ago
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- ☆47Apr 28, 2025Updated 10 months ago
- Social Engineering Browser Update Attack.☆57Nov 12, 2023Updated 2 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆473Oct 29, 2025Updated 4 months ago
- The repository for exam preparation for Microsoft 365 Certified: Enterprise Administrator Expert!☆14Apr 27, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- Slides of my public talks☆62Feb 20, 2026Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 4 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- This repo is about Active Directory Advanced Threat Hunting☆648Feb 17, 2025Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Repository to publish sample use cases, templates, solutions, automations for Microsoft Defender Threat Intelligence (MDTI) product☆80Sep 9, 2024Updated last year
- Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415☆27Oct 18, 2023Updated 2 years ago
- ☆33Apr 23, 2023Updated 2 years ago