<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>office365</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/308/feed"/>
    <updated>2026-04-22T05:48:19+00:00</updated>
    <id>https://links.biapy.com/guest/tags/308/feed</id>
            <entry>
            <id>https://links.biapy.com/links/10720</id>
            <title type="text"><![CDATA[AuditKit]]></title>
            <link rel="alternate" href="https://auditkit.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10720"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open-Source Compliance Scanner.
Multi-Cloud Compliance Scanner &amp;amp; Evidence Collection.
 
Scan AWS, Azure, and M365 for SOC2, PCI-DSS, HIPAA, CMMC, and NIST 800-53 compliance. Get audit-ready reports in minutes.

- [AuditKit @ GitHub](https://github.com/guardian-nexus/auditkit).]]>
            </summary>
            <updated>2025-10-20T06:16:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10427</id>
            <title type="text"><![CDATA[Prowler]]></title>
            <link rel="alternate" href="https://prowler.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10427"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open Source Cloud Security Tool.

 Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuous monitoring, security assessments &amp;amp; audits, incident response, compliance, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, ENS and more.

- [Prowler @ GitHub](https://github.com/prowler-cloud/prowler).

Related contents:

- [How to Complete Infrastructure Code Reviews Like a PRO @ microtica](https://www.microtica.com/blog/how-to-complete-infrastructure-code-reviews-like-a-pro).]]>
            </summary>
            <updated>2025-09-29T06:23:23+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10120</id>
            <title type="text"><![CDATA[doxx]]></title>
            <link rel="alternate" href="https://github.com/bgreenwell/doxx" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10120"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Expose the contents of .docx files without leaving your terminal. Fast, safe, and smart — no Office required!

A fast, terminal-native document viewer for Word files. View, search, and export .docx documents without leaving your command line.

Related contents:

- [Doxx - Pour lire vos fichiers Word depuis le terminal @ Korben :fr:](https://korben.info/doxx-terminal-viewer-word-rust.html).]]>
            </summary>
            <updated>2025-09-11T06:45:20+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/144</id>
            <title type="text"><![CDATA[Open Archiver]]></title>
            <link rel="alternate" href="https://openarchiver.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/144"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure, Open-source Email Archiving for Data Sovereignty.
Your Secure, Sovereign Email Archive.

Open Archiver is a self-hosted, open-source platform for archiving, searching, and managing your emails. Take control of your digital communication history, free from vendor lock-in.

- [Open Archiver @ GitHub](https://github.com/LogicLabs-OU/OpenArchiver).]]>
            </summary>
            <updated>2025-09-17T07:06:42+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1519</id>
            <title type="text"><![CDATA[Hawk]]></title>
            <link rel="alternate" href="https://github.com/T0pCyber/hawk" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1519"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Powershell Based tool for gathering information related to O365 intrusions and potential Breaches]]>
            </summary>
            <updated>2025-08-28T20:09:24+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1545</id>
            <title type="text"><![CDATA[AADInternals.com]]></title>
            <link rel="alternate" href="https://aadinternals.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1545"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AADInternals is PowerShell module for administering Azure AD and Office 365.

- [AADInternals @ GitHub](https://github.com/Gerenios/AADInternals).
- [AADInternals documentation](https://aadinternals.com/aadinternals/).]]>
            </summary>
            <updated>2025-08-28T20:13:26+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2809</id>
            <title type="text"><![CDATA[Monkey365]]></title>
            <link rel="alternate" href="https://silverhack.github.io/monkey365/#" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2809"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Monkey365 is an Open Source security tool that can be used to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Entra ID security configuration reviews without the significant overhead of learning tool APIs or complex admin panels from the start.

- [Monkey365 @ GitHub](https://github.com/silverhack/monkey365).
- [⚙Monkey365 - Open Source security tool @ Lauren M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_security-cybersecurity-microsoft-activity-7264536663907831808-7-UF/)]]>
            </summary>
            <updated>2025-08-28T23:45:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3235</id>
            <title type="text"><![CDATA[Halberd]]></title>
            <link rel="alternate" href="https://www.vectra.ai/blog/halberd-the-open-source-tool-democratizing-multi-cloud-security-testing" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3235"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Open-Source Tool Democratizing Multi-Cloud Security Testing by Arpan Sarkar.

Multi-Cloud Security Testing Tool to execute a comprehensive array of attack techniques across multiple surfaces via a simple web interface. 

Halberd is a powerful, multi-cloud security testing tool. Born out of the need for a unified, easy-to-use tool, Halberd enables you to proactively assess your cloud defenses by executing a comprehensive array of attack techniques across Entra ID, M365, Azure, and AWS. With its intuitive web interface, you can simulate real-world attacks, generate valuable telemetry, and validate your security controls with ease &amp;amp; speed.

- [Halberd @ GitHub](https://github.com/vectra-ai-research/Halberd).]]>
            </summary>
            <updated>2025-08-29T00:56:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3659</id>
            <title type="text"><![CDATA[Letsignit]]></title>
            <link rel="alternate" href="https://letsignit.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3659"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Best Email Signature Manager for Outlook &amp;amp; Office 365.

Design and deploy on-brand email signatures for your whole team. Connect with your audience in a way that&amp;#039;s on-brand and personal, while driving quality lead generation.]]>
            </summary>
            <updated>2025-08-29T02:06:19+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3661</id>
            <title type="text"><![CDATA[Maester]]></title>
            <link rel="alternate" href="https://maester.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3661"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Your Microsoft Security test automation framework!

Monitor your Microsoft 365 tenant&amp;#039;s security configuration using Maester!

Maester is an open source PowerShell-based test automation framework designed to help you monitor and maintain the security configuration of your Microsoft 365 environment.

- [Maester @ GitHub](https://github.com/maester365/maester).
- [Maester, l’outil pour automatiser vos tests de sécurité Microsoft 365 @ IT Connect :fr:](https://www.it-connect.fr/maester-automatiser-tests-de-securite-microsoft-365/).]]>
            </summary>
            <updated>2025-08-29T02:07:18+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3914</id>
            <title type="text"><![CDATA[winapps]]></title>
            <link rel="alternate" href="https://github.com/winapps-org/winapps" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3914"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Run Windows applications (including Microsoft 365 and Adobe Creative Cloud) on GNU/Linux with KDE, GNOME or XFCE, integrated seamlessly as if they were native to the OS.

Related contents:

- [Episode 624: Tiny PC, Huge Problems @ Linux Unplugged](https://linuxunplugged.com/624).
- [Episode 573 - Universal Blue Man Group @ Linux Unplugged](https://linuxunplugged.com/573).
- [WinApps - Faites tourner Office sur Linux comme si c&amp;#039;était du natif @ Korben :fr:](https://korben.info/winapps-windows-applications-linux-natif.html).]]>
            </summary>
            <updated>2025-09-04T12:17:47+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4476</id>
            <title type="text"><![CDATA[Azure Active Directory Auditing Tool]]></title>
            <link rel="alternate" href="https://admindroid.com/microsoft-365-azure-ad-auditing" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4476"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[AdminDroid Microsoft 365 auditing tool come up with immense reports on all the Microsoft 365 audit activities in the audit log search. Providing in-depth details on user sign-in activities is a head start for admins to analyze the users&amp;#039; sign-in data. With this Azure AD auditing tool, admins can monitor user logins, user activities, group activities, application activities, etc. Jazz up your Microsoft 365 Azure auditing without playing hard with PowerShell cmdlet like &amp;#039;Search-UnifiedAuditLog&amp;#039;.]]>
            </summary>
            <updated>2025-08-29T04:22:38+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4486</id>
            <title type="text"><![CDATA[Harden]]></title>
            <link rel="alternate" href="https://hardenad.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4486"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Secure infrastructure in minutes. Hardening Active Directory and Office 365.

- [Harden @ GitHub](https://github.com/LoicVeirman/HardenAD).
- [Hardening AD : Sécuriser vos infrastructures avec HardenAD @ Hamza Kondah&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/events/7132717233872474112/comments/).
- [bonnes pratiques en termes de configurations et durcissements autour de l&amp;#039;Active Directory @ Laurent M.&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/laurent-minne_github-cybersecurity-activedirectory-activity-7170309659516481536-Pw1g).]]>
            </summary>
            <updated>2025-08-29T04:24:43+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4789</id>
            <title type="text"><![CDATA[MAAD Attack Framework]]></title>
            <link rel="alternate" href="https://github.com/vectra-ai-research/MAAD-AF" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4789"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An attack tool for simple, fast &amp;amp; effective security testing of M365 &amp;amp; Azure AD. 

MAAD-AF is designed to make cloud security testing simple, fast and effective. Through its virtually no-setup requirement and easy to use interactive attack modules, security teams can test their security controls, detection and response capabilities easily and swiftly.]]>
            </summary>
            <updated>2025-08-29T05:15:03+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5603</id>
            <title type="text"><![CDATA[Untitled Goose Tool]]></title>
            <link rel="alternate" href="https://github.com/cisagov/untitledgoosetool" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5603"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments. Untitled Goose Tool gathers additional telemetry from Microsoft Defender for Endpoint (MDE) and Defender for Internet of Things (IoT) (D4IoT).]]>
            </summary>
            <updated>2025-08-29T07:32:09+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/5930</id>
            <title type="text"><![CDATA[TeamFiltration]]></title>
            <link rel="alternate" href="https://github.com/Flangvik/TeamFiltration" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/5930"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts.]]>
            </summary>
            <updated>2025-08-29T08:25:36+00:00</updated>
        </entry>
    </feed>
