hawk
Forensic tool
A PowerShell-based tool designed to facilitate forensic analysis in O365 environments by gathering and organizing relevant data.
Powershell Based tool for gathering information related to O365 intrusions and potential Breaches
708 stars
40 watching
117 forks
Language: PowerShell
last commit: 17 days ago
Linked from 1 awesome list
azure-active-directorycloud-forensicsexchange-onlineo365office365powershell-module
Related projects:
Repository | Description | Stars |
---|---|---|
azure/cloud-katana | Automates security assessment and research in cloud-native environments using event-driven serverless computing | 250 |
prowler-cloud/prowler | An automated security assessment tool for cloud and container environments | 10,839 |
s0md3v/striker | An offensive information and vulnerability scanner that identifies potential security issues in web applications | 2,234 |
hausec/powerzure | A framework to assess and exploit resources within Azure cloud platform | 1,106 |
netspi/microburst | A collection of scripts and functions to assess Microsoft Azure security from various attack vectors | 2,046 |
infocyte/pshunt | A Powershell Threat Hunting Module designed to scan and survey remote endpoints for indicators of compromise or comprehensive system information. | 279 |
r0075h3ll/oralyzer | A tool to identify vulnerabilities in web applications by probing for Open Redirections and other types of attacks. | 753 |
darkquasar/azurehunter | A tool to analyze and mine cloud forensic data from Azure and O365 audit logs. | 770 |
411hall/jaws | A PowerShell script designed to gather information about Windows system vulnerabilities and potential attack vectors | 1,693 |
gfoss/psrecon | Automates data collection and forensic analysis from remote Windows hosts using PowerShell | 479 |
darkoperator/posh-virustotal | A PowerShell module for interacting with the VirusTotal API to analyze suspicious files and URLs. | 119 |
optiv/microsoft365_devicephish | A tool designed to demonstrate a vulnerability in Microsoft's OAuth Authorization Flow for phishing attacks | 92 |
crowdstrike/crt | A tool designed to help organizations discover and manage permissions in Microsoft 365 environments | 706 |
ekultek/pybelt | A collection of tools for hackers and security researchers to explore vulnerabilities and test systems | 511 |
tenable/terrascan | Detects security vulnerabilities and compliance issues in infrastructure code before provisioning cloud-native infrastructure. | 4,766 |