This will be a repository of SentinelOne Deep Visibility queries both the Standard Queries and the Power Queries. Most of these queries will be for Windows.
☆35Apr 29, 2026Updated 3 weeks ago
Alternatives and similar repositories for SentinelOne-Queries
Users that are interested in SentinelOne-Queries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SentinelOne STAR Rules☆76Feb 11, 2025Updated last year
- ☆73Jun 20, 2023Updated 2 years ago
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆94Jan 11, 2021Updated 5 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 4 years ago
- Beginners Guide to Hunting for Threats☆19Apr 26, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆15Dec 22, 2021Updated 4 years ago
- Windows Scripts☆12Apr 2, 2020Updated 6 years ago
- Tools and scripts to deploy and manage OpenRelik instances☆16Mar 23, 2026Updated last month
- Critical Success Factor (CSF) tutorial☆20Apr 14, 2025Updated last year
- ☆42Apr 18, 2023Updated 3 years ago
- Huntress API☆11May 26, 2022Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- Splunk TA for sending completion requests to ChatGPT☆27May 18, 2024Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆26Feb 8, 2026Updated 3 months ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- Slides of my public talks☆63Feb 20, 2026Updated 3 months ago
- Memory Loader Open Source Project by Sentinel-Labs.☆25Mar 26, 2021Updated 5 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Deception implementation through analysis of BloodHound data☆59May 13, 2026Updated last week
- ☆11Oct 3, 2021Updated 4 years ago
- Passivedns monitor implementation in Rust.☆12Apr 21, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆66Oct 19, 2021Updated 4 years ago
- CLI for selecting or defining prompts to use with the ChatGPT chatbot, which retrieves the prompts from the awesome-chatgpt-prompts repos…☆12Mar 29, 2023Updated 3 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆57Mar 18, 2022Updated 4 years ago
- Simulate Windows EXE for Malware Research!☆20Sep 4, 2024Updated last year
- This package allows the use of a custom Elastalert Alert which creates alerts with observables in TheHive using TheHive4Py.☆26May 18, 2021Updated 5 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Powershell Scripts☆13Aug 26, 2024Updated last year
- Archives graylog indices.☆13Oct 16, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- A tool that can be used to close network connections automatically with a given parameters☆14Apr 19, 2023Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- a C# reimplementation of Bart Busschots' xkpasswd.pm, a library for generating secure memorable passwords inspired mainly by a well-known…☆14Jan 31, 2020Updated 6 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 5 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago