<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Technical Library on Alfred van Ster</title><link>https://avanster.tech/library/</link><description>Recent content in Technical Library on Alfred van Ster</description><generator>Hugo -- 0.160.1</generator><language>en-us</language><lastBuildDate>Sat, 10 Jan 2026 11:00:00 +0000</lastBuildDate><atom:link href="https://avanster.tech/library/index.xml" rel="self" type="application/rss+xml"/><item><title>SecOps: SentinelOne Global Threat Scraper</title><link>https://avanster.tech/library/s1-threat-scraper/</link><pubDate>Sat, 10 Jan 2026 11:00:00 +0000</pubDate><guid>https://avanster.tech/library/s1-threat-scraper/</guid><description>&lt;p&gt;When a new 0-day vulnerability or a suspicious file hash is identified, waiting for a scheduled scan is not an option. This PowerShell tool utilizes the SentinelOne Management API to &amp;ldquo;scrape&amp;rdquo; the entire fleet for specific indicators of compromise (IOCs).&lt;/p&gt;
&lt;h3 id="1-the-workflow"&gt;1. The Workflow&lt;/h3&gt;
&lt;p&gt;The script performs the following steps:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Authentication:&lt;/strong&gt; Connects via API Token to the S1 Management Console.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Query:&lt;/strong&gt; Requests a list of all endpoints where a specific file hash or process has been detected in the last 24 hours.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Reporting:&lt;/strong&gt; Generates a CSV list of infected Hostnames, IP addresses, and the &amp;ldquo;Detection State&amp;rdquo; (Mitigated vs. Active).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="2-the-implementation"&gt;2. The Implementation&lt;/h3&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-powershell" data-lang="powershell"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# S1 API Configuration&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$ApiToken = &lt;span style="color:#e6db74"&gt;&amp;#34;YOUR_API_TOKEN&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$BaseUrl = &lt;span style="color:#e6db74"&gt;&amp;#34;[https://your-console.sentinelone.net/web/api/v2.1](https://your-console.sentinelone.net/web/api/v2.1)&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$Header = @{ &lt;span style="color:#e6db74"&gt;&amp;#34;Authorization&amp;#34;&lt;/span&gt; = &lt;span style="color:#e6db74"&gt;&amp;#34;Token &lt;/span&gt;$ApiToken&lt;span style="color:#e6db74"&gt;&amp;#34;&lt;/span&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Define the Threat Hash to hunt for&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$TargetHash = &lt;span style="color:#e6db74"&gt;&amp;#34;e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Search for the hash across the site&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$Response = Invoke-RestMethod -Uri &lt;span style="color:#e6db74"&gt;&amp;#34;&lt;/span&gt;$BaseUrl&lt;span style="color:#e6db74"&gt;/threats?contentHashes=&lt;/span&gt;$TargetHash&lt;span style="color:#e6db74"&gt;&amp;#34;&lt;/span&gt; -Method Get -Headers $Header
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; ($Response.data) {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; Write-Host &lt;span style="color:#e6db74"&gt;&amp;#34;ALERT: Threat detected on &lt;/span&gt;$($Response.data.count)&lt;span style="color:#e6db74"&gt; endpoints!&amp;#34;&lt;/span&gt; -ForegroundColor Red
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; $Response.data | Select-Object computerName, lastActiveDate, threatName | Export-Csv -Path &lt;span style="color:#e6db74"&gt;&amp;#34;./ThreatReport.csv&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;} &lt;span style="color:#66d9ef"&gt;else&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; Write-Host &lt;span style="color:#e6db74"&gt;&amp;#34;Clear: No matches found for the target hash.&amp;#34;&lt;/span&gt; -ForegroundColor Green
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description></item><item><title>AD Automation: Inactive Account Reaper</title><link>https://avanster.tech/library/active-directory-user-cleanup/</link><pubDate>Sat, 03 Jan 2026 09:00:00 +0000</pubDate><guid>https://avanster.tech/library/active-directory-user-cleanup/</guid><description>&lt;p&gt;Stale accounts are a primary vector for lateral movement in a compromised network. This script automates the &amp;ldquo;Sanitization&amp;rdquo; phase of identity management by identifying and disabling dormant accounts.&lt;/p&gt;
&lt;h3 id="1-the-logic-flow"&gt;1. The Logic Flow&lt;/h3&gt;
&lt;p&gt;The script follows a safe-failure logic to ensure no critical service accounts are accidentally disabled:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Targeting:&lt;/strong&gt; Narrowly scopes the search to specific User OUs.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Evaluation:&lt;/strong&gt; Filters for &lt;code&gt;LastLogonDate&lt;/code&gt; older than 90 days.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Action:&lt;/strong&gt; Disables the account and logs the event for auditing.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id="2-the-implementation"&gt;2. The Implementation&lt;/h3&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-powershell" data-lang="powershell"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Configuration&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$DaysInactive = &lt;span style="color:#ae81ff"&gt;-90&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$TargetDate = (Get-Date).AddDays($DaysInactive)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;$LogPath = &lt;span style="color:#e6db74"&gt;&amp;#34;C:\Logs\AD_Cleanup_&lt;/span&gt;$(Get-Date -Format &lt;span style="color:#e6db74"&gt;&amp;#39;yyyyMMdd&amp;#39;&lt;/span&gt;)&lt;span style="color:#e6db74"&gt;.log&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;# Fetch and Process&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Get-ADUser -Filter &lt;span style="color:#e6db74"&gt;&amp;#39;LastLogonDate -lt $TargetDate -and Enabled -eq $true&amp;#39;&lt;/span&gt; -Properties LastLogonDate |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; ForEach-Object {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; $User = $_.SamAccountName
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;try&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#75715e"&gt;# Use -WhatIf for safety during testing&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; Disable-ADAccount -Identity $_.DistinguishedName -ErrorAction Stop
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; Add-Content -Path $LogPath -Value &lt;span style="color:#e6db74"&gt;&amp;#34;SUCCESS: Disabled &lt;/span&gt;$User&lt;span style="color:#e6db74"&gt; (Last Login: &lt;/span&gt;$($_.LastLogonDate)&lt;span style="color:#e6db74"&gt;)&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; } &lt;span style="color:#66d9ef"&gt;catch&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; Add-Content -Path $LogPath -Value &lt;span style="color:#e6db74"&gt;&amp;#34;ERROR: Failed to disable &lt;/span&gt;$User&lt;span style="color:#e6db74"&gt;. Check permissions.&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description></item><item><title>AD User Cleanup Script</title><link>https://avanster.tech/library/sample-script/</link><pubDate>Sat, 03 Jan 2026 00:00:00 +0000</pubDate><guid>https://avanster.tech/library/sample-script/</guid><description>A PowerShell script to identify and disable inactive AD users.</description></item></channel></rss>