๐Ÿ“˜
DFIR
search
โŒ˜Ctrlk
๐Ÿ“˜
DFIR
  • Networking
    • Networking
  • Windows
    • Administration
    • Forensics
    • Cheat Sheet
    • Investigation
    • Internals
    • Active Directory
    • MISC
  • Linux
    • Forensics
    • SSH
    • Linux WebShells
    • Directories of Interest
    • Internals
  • Enterprise Architecture
    • CI/CD Pipline
    • Citrix
    • Web Applications
    • The Cloud
      • AWS
      • Azure
      • M365
        • Forensics
          • Tokens
        • Business Email Compromise
        • Hardening
      • Cloud Labs
    • vSphere
    • Containers
    • Troubleshooting
  • Mac
    • Forensics
  • Attacker Information
    • Adversary Operations
    • Actor Playbooks
    • Abused Domains
  • IR Playbook
    • Activity from Unmanaged Host
    • Recommendations
  • Reverse Engineering
    • Python - Pyinstaller
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Enterprise Architecturechevron-right
  2. The Cloudchevron-right
  3. M365

Forensics

LogoAzureAD-incident-response/README.md at main ยท WillOram/AzureAD-incident-responseGitHubchevron-right
https://guillaumeben.xyz/Microsoft-365-enumeration/guillaumeben.xyzchevron-right
LogoGood UAL Hunting | Microsoft Community HubTECHCOMMUNITY.MICROSOFT.COMchevron-right
LogoDetecting Post-Compromise Threat Activity in Microsoft Cloud Environments | CISACybersecurity and Infrastructure Security Agency CISAchevron-right
PreviousM365chevron-leftNextTokenschevron-right

Last updated 2 years ago