RoqueNight / DefenderATP-Proactive-Threat-Hunting-Queries-KQL
List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by developing custom TTP'S from red-teaming engagements & simulations with the strategic goal to prevent threats before they have the opportunity to execute
☆24Updated 3 years ago
Alternatives and similar repositories for DefenderATP-Proactive-Threat-Hunting-Queries-KQL:
Users that are interested in DefenderATP-Proactive-Threat-Hunting-Queries-KQL are comparing it to the libraries listed below
- ☆72Updated 3 months ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆37Updated 3 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆52Updated last year
- Notes on responding to security breaches relating to Azure AD☆97Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆31Updated 2 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆39Updated 4 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆49Updated 2 years ago
- ☆45Updated 3 weeks ago
- Hunting Queries for Defender ATP☆79Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆52Updated this week
- ☆28Updated 4 years ago
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆79Updated 4 years ago
- Full of public notes and Utilities☆95Updated 2 months ago
- Slides of my public talks☆49Updated last year
- ☆41Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆61Updated 3 weeks ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆21Updated 3 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆111Updated last year
- ☆30Updated 3 years ago
- Library of threat hunts to get any user started!☆41Updated 4 years ago
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆9Updated last year
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- Detection of obfuscated Powershell commands☆54Updated last year
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆82Updated 5 months ago
- A PowerShell incident response script for quick triage☆78Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 3 years ago
- ☆54Updated last year