Starred repositories
PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.
Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?
This is the public repo for Microsoft Entra documentation
Qualys community open source scripts. Please note these are provided as-is and are not supported.
Finding all things on-prem Microsoft for password spraying and enumeration.
This repo is used to host the source for the Microsoft 365 documentation on https://docs.microsoft.com.
Security Remediation Guides
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
A curated list of awesome Security Hardening techniques for Windows.
WhiteWinterWolf's PHP web shell
Repository of attack and defensive information for Business Email Compromise investigations
Documentation and scripts to properly enable Windows event logs.
HardeningKitty - Checks and hardens your Windows configuration
Leaked pentesting manuals given to Conti ransomware crooks
⭐️ A curated list of awesome forensic analysis tools and resources
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
The Azure Active Directory Incident Response PowerShell module provides a number of tools, developed by the Azure Active Directory Product Group in conjunction with the Microsoft Detection and Resp…
CA Optics - Azure AD Conditional Access Gap Analyzer
AADInternals PowerShell module for administering Azure AD and Office 365
This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.
Share your own Graph PowerShell samples in the Discussions tab.
Repository for the Microsoft Identity Tools PowerShell module which provides various tools for performing enhanced Identity administration activities.
Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks