☆10Oct 25, 2020Updated 5 years ago
Alternatives and similar repositories for Sysmon_to_AdvancedHunting_KQL
Users that are interested in Sysmon_to_AdvancedHunting_KQL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Turn your recursive DNS (BIND) server into a network investigation enabler with DnsTap and RPZ. Make PTR recs great again!☆14Sep 5, 2025Updated 6 months ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- Read only mirror. To contribute or submit issues, please go to the website link --->☆15Jul 25, 2023Updated 2 years ago
- Miscellaneous notebooks to use with Sentinel Hub☆20Aug 28, 2023Updated 2 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- Defender XDR Advanced Hunting Queries (MDE, MDAV, Device Discovery)☆12Jan 22, 2026Updated 2 months ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 3 years ago
- A lab environment for learning about MSTICPy☆38Feb 3, 2023Updated 3 years ago
- DEPRECATED -> GO TO https://github.com/microsoft/Microsoft-threat-protection-Hunting-Queries☆20Apr 22, 2020Updated 5 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆40Aug 21, 2018Updated 7 years ago
- NMAP Script for SCADA protocol☆23Feb 18, 2019Updated 7 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- ☆19Sep 3, 2021Updated 4 years ago
- A ComplianceAsCode blog☆30Feb 25, 2026Updated 3 weeks ago
- What's new in Java 8? A developer focuses short presentation (20 min) created with the awesome reveal.js☆27Nov 8, 2014Updated 11 years ago
- Meta-repository of big data tools -- source and essential plugins for hadoop, pig, wukong, storm, kafka etc.☆30Jun 29, 2014Updated 11 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 5 months ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- Advanced Hunting Queries for Microsoft Security Products☆108Jan 10, 2023Updated 3 years ago
- ☆39Sep 29, 2021Updated 4 years ago
- Port scanner in bash☆16Nov 8, 2013Updated 12 years ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Aug 13, 2022Updated 3 years ago
- ☆49Mar 25, 2022Updated 3 years ago
- Panoptes Endpoint Detection and Response Solution☆43Mar 7, 2026Updated 2 weeks ago
- A repository for personal information data patterns and detection for EU member states. These will be useful to understand how to best de…☆13Jul 10, 2018Updated 7 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Mar 13, 2024Updated 2 years ago
- Sample code for the "What's new in Spring Data?" session at SpringOne 2016☆15Jul 31, 2016Updated 9 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago