Windows Defender ATP - Advanced Hunting Queries
☆22Apr 12, 2018Updated 7 years ago
Alternatives and similar repositories for WDATP-Advanced-Hunting
Users that are interested in WDATP-Advanced-Hunting are comparing it to the libraries listed below
Sorting:
- ☆14Feb 22, 2021Updated 5 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Additional Resources to improve Customer Experience with Azure Advanced Threat Protection☆22Jun 12, 2023Updated 2 years ago
- Miscellaneous Azure Sentinel files that don't fall into other categories.☆13Aug 23, 2021Updated 4 years ago
- PowerShell Scripts, Snippets, bare minmium ideas☆15Feb 5, 2026Updated 3 weeks ago
- Javascript deobfuscation tool☆17Apr 6, 2018Updated 7 years ago
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- All about Microsoft 365 Enterprise Mobility + Security (EMS)☆25Dec 3, 2023Updated 2 years ago
- Advanced Hunting Queries for Microsoft Security Products☆108Jan 10, 2023Updated 3 years ago
- Defender Resource Hub☆30Feb 23, 2026Updated last week
- Microsoft Defender ATP Manageability and Maintenance scripts☆29Jun 12, 2023Updated 2 years ago
- ☆11Nov 13, 2024Updated last year
- This repository is used to store the Azure Information Protection Deployment Acceleration Guide☆29May 31, 2019Updated 6 years ago
- ☆33Jun 27, 2022Updated 3 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆34Sep 15, 2023Updated 2 years ago
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- ☆30Nov 11, 2024Updated last year
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,051Feb 17, 2022Updated 4 years ago
- Run TFLITE models on the web☆12Jan 2, 2022Updated 4 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Sep 19, 2023Updated 2 years ago
- A command line tool to explore real-time streams of events.☆89Feb 14, 2025Updated last year
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- ☆19Feb 4, 2026Updated 3 weeks ago
- Code samples for Query relational data in Azure☆17Jun 10, 2020Updated 5 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- ☆12Jun 24, 2024Updated last year
- Find and list Access Keys older than certain date☆13Jan 27, 2018Updated 8 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Roadmap for Lantern development☆12Mar 2, 2018Updated 7 years ago
- AWS KMS Encryption & Decyption using CLI & Lambda☆11Apr 12, 2021Updated 4 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Implement MTCNN with Tensorflow.js. A face detection framework with MTCNN and Tensorflow.js☆11Jun 30, 2022Updated 3 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago