Skip to content
View mvelazc0's full-sized avatar

Block or report mvelazc0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
mvelazc0/README.md

Hi there 👋

I'm Mauricio. Currently, I'm a security researcher at Microsoft. My areas of focus include detection engineering, threat hunting and adversary simulation.

I (ocassionally) maintain a blog at https://medium.com/@mvelazco/.

I have presented and hosted workshops at conferences including BlackHat Arsenal, Defcon, DerbyCon, BSides, X33fcon, BruCON, Splunk .conf, SANS, MITRE ATT&CKcon, and others. Most of these can be found here: Talks-Presentations.

You can also find me on Twitter and LinkedIn.


Pinned Loading

  1. Talks-Presentations Talks-Presentations Public

    Resource links (video, slides & code) for my conference talks | presentations | workshops

    12 6

  2. PurpleSharp PurpleSharp Public

    PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments

    C# 782 110

  3. defcon27_csharp_workshop defcon27_csharp_workshop Public

    Writing custom backdoor payloads with C# - Defcon 27 Workshop

    C# 1.1k 268

  4. BadZure BadZure Public

    BadZure orchestrates the setup of Azure AD tenants, populating them with diverse entities while also introducing common security misconfigurations to create vulnerable tenants with multiple attack …

    Python 429 25

  5. PurpleTeamPlaybook PurpleTeamPlaybook Public

    Active Directory Purple Team Playbook

    105 20

  6. msInvader msInvader Public

    M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.

    Python 222 12