Stars
Enable the automatic deployment of Azure Sentinel using code
Interesting APT Report Collection And Some Special IOCs
This repository contains Community and Field contributed content for LogScale
Prowler is the Open Cloud Security for AWS, Azure, GCP, Kubernetes, M365 and more. As agent-less, it helps for continuous monitoring, security assessments & audits, incident response, compliance, h…
PowerShell for CrowdStrike's OAuth2 APIs
Small and highly portable detection tests based on MITRE's ATT&CK.
KQL Queries. Microsoft Defender, Microsoft Sentinel
Code included as part of the MustLearnKQL blog series
A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.
Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or even inspiration).
A curated list of amazingly awesome open-source sysadmin resources.
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation tech…
PowerShell Digital Forensics & Incident Response Scripts.
AI-powered tool designed to help producing Threat Intelligence Mindmap.
A curated list of Awesome Threat Intelligence resources
KQL Queries. Microsoft Defender, Microsoft Sentinel
M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.
Open Adversarial Exposure Validation Platform
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Sharing my KQL queries for Azure Sentinel
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
Quick reference links for managing and coordinating the response to cyber security incidents