// case type
cloud account compromise (M365 / Workspace)
tenant-level intrusion — OAuth grants, app consent abuse, mailbox rule planting, exchange transport rule tampering.
start here · primary tools
ordered. work top-down. the first tool is the suggested entry point for this case type.
- office365 audit log analyzerdrop m365 unified audit log json or csv · flag inbox forward rules · mailbox forwarding · bulk downloads · global admin role adds · high-scope consent · audit log disabled · runs locally
- microsoft 365 unified audit log analyzerdrop m365 unified audit log csv or json export · parse all audit events across exchange sharepoint teams onedrive and azure ad · surface suspicious operations privilege changes and data access events · reconstruct user activity timeline · runs locally
- o365 audit log parserunified audit log json · timeline · suspicious · users · ips · mailbox · inbox rules · csv export · runs locally
- okta log analyzerokta system log json · timeline · suspicious · mfa fatigue · tor/proxy · users · ips · policy · csv export · runs locally
- mail rule parserdrop Outlook rules.dat or Thunderbird msgFilterRules.dat · rule names conditions actions · flag suspicious forward redirect · CSV export · runs locally
- google takeout parserdrop a Google Takeout ZIP · parse location history · YouTube watch history · search activity · Chrome history · activity logs · export CSV · runs locally
- google takeout archive forensic parserdrop google takeout zip or individual takeout json csv html files · parse account activity across all google services · reconstruct location history search history youtube watch history gmail metadata and drive activity · surface forensic timeline across all google products · runs locally
- aws cloudtrail forensic deep analyzerdrop cloudtrail json logs · detect privilege escalation paths · credential theft · data exfiltration · lateral movement between services · unusual api patterns · flag attacker ips · runs locally
also useful · secondary tools
supporting and follow-up tools. surface as the investigation widens.
- aws iam policy analyzerpaste iam policy json · effective permissions · wildcard expansion · risks · escalation hints · plain english · runs locally
- iam escalation graphiam policy json · wildcard expansion · 15 escalation patterns · attack chains · severity · csv + json export · runs locally
- gcp audit log analyzerdrop google cloud audit log json · api calls · iam changes · storage access · vm events · security findings · runs locally
- azure activity log analyzerdrop azure activity log json · operations timeline · rbac changes · vm events · security · network changes · runs locally
- aws s3 access log analyzerdrop s3 server access logs · request timeline · top requesters · error analysis · exfiltration detection · unauthorized access · runs locally
- case report generatorfill in case number · examiner · dates · findings · drop evidence files for auto hash · generates structured forensic report PDF · runs locally
run as a stack
skip the click-through. these presets are curated forensic pipelines you can save as a stack with one click and run on your evidence locally.
cloud account compromise — audit kit
8 stepsdrop M365 / Google / AWS / Azure exports → parse each tenant log → unified timeline → report
- 01evidence-manifest-generatorhash raw audit exports — most CSPs won't re-issue them
- 02office365-audit-log-analyzerparse Exchange / SharePoint / Teams audit events
- 03microsoft365-audit-log-analyzerunified M365 audit log parsing for cross-workload events
- 04google-takeout-forensic-parserparse Google Takeout / Workspace activity exports
- 05aws-cloudtrail-deep-analyzerdeep-parse CloudTrail JSON for IAM + API abuse patterns
- 06azure-ad-signin-analyzerAzure AD sign-in log analysis for OAuth / consent abuse
- 07forensic-timeline-buildermerge all tenant events into one cross-cloud timeline
- 08case-report-generatordraft a report identifying persistence windows + recommended revocations
cloud account compromise — OAuth abuse kit
8 stepsdrop M365 + Okta audit exports → parse tenant logs → mail rules → IAM policy → escalation graph → timeline → report
- 01evidence-manifest-generatorhash raw audit exports — CSPs rarely re-issue them
- 02office365-audit-log-analyzerparse Exchange / SharePoint / Teams audit events for OAuth grant abuse
- 03okta-log-analyzerparse Okta system log for app consent + MFA bypass events
- 04mail-rule-parserextract mailbox rules planted after OAuth consent — common persistence vector
- 05iam-policy-analyzeranalyze IAM policy changes during the compromise window
- 06iam-escalation-graphbuild an escalation graph from IAM policy + role assumption events
- 07forensic-timeline-buildermerge OAuth consent + rule change + IAM events into one timeline
- 08case-report-generatordraft a report identifying malicious app grants + recommended revocations