rafalfitt's Stars
scipag/HardeningKitty
HardeningKitty - Checks and hardens your Windows configuration
LoicVeirman/HardenAD
Hardening Active Directory version 2
Kili69/T1JIT
Tier 1 Just-In-Time
Kili69/Tier0-User-Management
Maintain Tier 0 users. This script take care all Tier 0 users are in the correct OU or in the default user container and add the Kerberos Authentication policy to the user
CompassSecurity/OnPremSecurityBestPractices
mttaggart/wtfbins
WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.
gtworek/VolatileDataCollector
SkipToTheEndpoint/OpenIntuneBaseline
Community-driven baseline to accelerate Intune adoption and learning.
przybylskirobert/ADSecurity
Place where I'm putting all the scripts and config files regarding Active Directory Security.
microsoft/AttackSurfaceAnalyzer
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
MariuszFerdyn/AzureSecurityCenterOSRemediations
Harden365/Harden365
Protect your data in minutes !
Azure/Microsoft-Defender-for-Cloud
Welcome to the Microsoft Defender for Cloud community repository
Cloud-Architekt/AzureAD-Attack-Defense
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
cisagov/ScubaGear
Automation to assess the state of your M365 tenant against CISA's baselines
nathanmcnulty/nathanmcnulty
microsoft/ConditionalAccessforZeroTrustResources
ConditionalAccessforZeroTrustResources holding resources for Azure AD CA guidance for Zero Trust
leadfollowmove/nosocial
Similar to nohello but aimed at being more direct
microsoft/Intune-Config-Frameworks
This repository of JSON files are used to create configuration frameworks to protect data and devices using App Protection Policies and mobile device compliance and configuration policies.
Azure/migration
azsk/AzTS-docs
PwC-IR/Business-Email-Compromise-Guide
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
fwupd/dbx-firmware
DBXUpdate files from Microsoft
olafhartong/sysmon-modular
A repository of sysmon configuration modules
adamshostack/4QuestionFrame
Shostack's 4 Question Frame for Threat Modeling
Bert-JanP/Hunting-Queries-Detection-Rules
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
zeronetworks/rpcfirewall
Trimarc/Create-Vulnerable-ADDS
Installs ADDS and configures a vulnerable domain via a powershell script
swannman/ircapabilities
Incident Response Hierarchy of Needs
UMSKT/UMSKT
Universal MS Key Toolkit