Skip to content

guardzcom/security-research-labs

Security Research Labs

Tools, scripts, and research PoCs for Purple Team, Red Team, AI Security, Forensic, and Cloud security. Authorized use only.

GitHub stars GitHub release (latest by date) License: MIT Tools Platform PowerShell

AI & Cloud Purple Team M365 Threat Intel GWS

Security Research Labs is the official Guardz repo for open-source security tooling: config analyzers, Microsoft 365 / Entra recon scripts, purple-team detection emulations, and AI skill security. MIT-licensed; each tool lives in a dedicated folder with its own README.


Repository layout

Category Folder Contents
AI AI-Cloud-Tools/ AI: OpenClaw Analyzer, SkillScan. M365-Tools: OAuth IOCs checker, EntraReaper (MCP + AADInternals for authorized Entra ID red team).
Purple Purple-Team-Emulation/ Endpoint: certutil, EDR telemetry simulator, Office macro tampering, BloodHound emulation, Nmap scanning emulation.
M365 CloudAdversary/M365/ DeviceStrike, Entra ID Smart Lockout (Entra-ID-DOS), SPO Ext Recon, GraphRunner QuickStart.
GWS Purple-Team-Emulation/GWS/ Google Workspace security tools (placeholder).
Threat Intel Threat-Intel/ IOCs, detection artifacts, threat intelligence.
Research Research/ Research outputs, landscape studies, and reference materials (e.g. AiTM tools).

Who it's for

Category Audience Use case
Cloud Cloud Security Microsoft 365 and Google Workspace.
AI AI security Securing AI assistants and agents: config hardening, exposure detection, supply-chain and skill safety.
Purple Purple team Hardening checks, config review, detection-oriented recon.
Red Red team Authorized recon, token flows, M365/cloud attack-surface mapping.
Forensic Forensic Evidence gathering, mailbox/SharePoint/Teams search patterns, audit trails.

Authorized use only. Use only on systems and tenants you own or have explicit permission to test.


Security model (important)

Compliance & authorized use

  • Authorized use only. These tools are for security research, authorized testing, and defensive operations. Use them only on systems and tenants you own or have explicit permission to test.
  • No misuse. Do not use this repo to gain unauthorized access, exfiltrate data, or violate laws or organizational policies. Misuse is your responsibility.
  • Operational risk. Recon and auth scripts can trigger alerts or rate limits. Coordinate with stakeholders and follow change management where required.
  • Data handling. Output may contain sensitive information. Handle and retain it according to your classification and retention policies.

By using this repository you agree to use it in a lawful and authorized manner. See SECURITY.md for how to report vulnerabilities in the repo itself.


Support & community

We do not provide formal SLAs or commercial support; we respond when we can.


License

MIT License. Subdirectories may contain their own license files; where present, they apply to that project.