Repo of KC7 challenge scenarios
☆27Aug 30, 2025Updated 6 months ago
Alternatives and similar repositories for kc7_data
Users that are interested in kc7_data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A cybersecurity game in Azure Data Explorer☆174Jul 12, 2024Updated last year
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- KustoHawk is a lightweight incident triage and response tool designed for effective incident response in Microsoft Defender XDR and Micro…☆134Updated this week
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆15Nov 24, 2025Updated 3 months ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆32Jan 16, 2024Updated 2 years ago
- Zeek Auxiliary Programs☆27Mar 13, 2026Updated last week
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- This repo contains example software for the Kernelcon 2021 Hack Live! badge - the Hacker HotKey.☆17May 7, 2021Updated 4 years ago
- ☆30Updated this week
- Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.☆16Dec 10, 2019Updated 6 years ago
- Silk File Reader☆14Mar 9, 2022Updated 4 years ago
- Home repo for documentation and links to resources☆12Jul 25, 2019Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- ☆13Feb 18, 2024Updated 2 years ago
- ☆11Aug 23, 2021Updated 4 years ago
- Tools and scripts that are useful with the Microsoft Entra ID, M365, and Azure cloud☆15Aug 29, 2025Updated 6 months ago
- Repository with Hunting and Detection Queries for Microsoft Sentinel and Microsoft Defender XDR☆17Nov 7, 2025Updated 4 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- ☆16Mar 9, 2026Updated 2 weeks ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆22Nov 22, 2021Updated 4 years ago
- Troubleshooting MDE Workstations☆42Jan 7, 2026Updated 2 months ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- The Intelligent Investor in Python☆20Mar 14, 2015Updated 11 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- An automation framework for deploying Microsoft Sentinel environments using pipelines. This project combines infrastructure-as-code (Bice…☆36Updated this week
- This repository stores my learning journey and write-ups throughout the security blue team's Blue Team Junior Analyst Certification☆19May 12, 2024Updated last year
- Solutions for the Master Azure Bicep udemy course☆19Jun 29, 2025Updated 8 months ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year
- ☆17Aug 27, 2022Updated 3 years ago
- ☆85Nov 22, 2022Updated 3 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- ☆56Updated this week
- Automated security investigation tool using Microsoft MCP Servers, GitHub Copilot, Python Modules and custom copilot-instructions.☆60Updated this week
- Intro Labs Remastered☆35Mar 7, 2025Updated last year
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Sep 30, 2016Updated 9 years ago