Azure
Repository for Azure Resource Policy built-in definitions and samples
CA Optics - Azure AD Conditional Access Gap Analyzer
Microsoft Threat Intelligence Security Tools
Intune managed Secured workstation
Notes on responding to security breaches relating to Azure AD
Azure Powershell code samples, often used in docs.microsoft.com/Azure developer documentation
A tool for checking if MFA is enabled on multiple Microsoft Services
Rules to validate Azure resources and infrastructure as code (IaC) using PSRule.
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…
Tooling for assessing an Azure AD tenant state and configuration
🎨 Diagram as Code for prototyping cloud system architectures
Azure Governance Visualizer aka AzGovViz is a PowerShell script that captures Azure Governance related information such as Azure Policy, RBAC (a lot more) by polling Azure ARM, Storage and Microsof…
Building environments to replicate small networks and deploy applications
Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based approach
A collection of Azure AD/Entra tools for offensive and defensive security purposes
A process for automating Docker container base image updates.
Public Repository for Extensions of Azure CLI.
Interactive visualizations of Terraform dependency graphs using d3.js
Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azur…
An open source, cloud-native security to protect everything from build to runtime
open source, cloud-native, graph-based asset inventory
A Serverless Security Library for Developers. Regain Control Over Your AWS Lambda & Google Cloud Functions Runtimes.
Microsoft Entra ID App Audit Solution (AADAppAudit)
Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
Data pipelines for cloud config and security data. Build cloud asset inventory, CSPM, FinOps, and vulnerability management solutions. Extract from AWS, Azure, GCP, and 70+ cloud and SaaS sources.