bluemountaincyber / building-detections-azureLinks
☆13Updated last year
Alternatives and similar repositories for building-detections-azure
Users that are interested in building-detections-azure are comparing it to the libraries listed below
Sorting:
- Notes on responding to security breaches relating to Azure AD☆118Updated 3 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆59Updated 3 months ago
- Content Repo for Demystifying KQL Tutorial Series☆71Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆66Updated 2 weeks ago
- Repository with Sentinel Analytics Rules, Hunting Queries and helpful external data sources.☆133Updated this week
- ☆96Updated 3 months ago
- A guide to using Azure Data Explorer and KQL for DFIR☆117Updated 3 years ago
- ☆15Updated 2 years ago
- ☆44Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- Security Scripts and Sources for daily usage.☆67Updated last month
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆88Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆318Updated last month
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆39Updated last year
- A starter pack of resources to help you get started in Detection Engineering.☆174Updated 2 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆54Updated 2 years ago
- MISP to Sentinel integration☆77Updated 3 weeks ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆21Updated 4 years ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated last year
- Full of public notes and Utilities☆129Updated 9 months ago
- A repository to share publicly available Velociraptor detection content☆190Updated last week
- Repository of attack and defensive information for Business Email Compromise investigations☆268Updated 6 months ago
- Repository with Sample KQL Query examples for Threat Hunting☆217Updated 3 years ago
- Conference presentations☆60Updated last month
- ☆100Updated last month
- KQL Queries☆23Updated 2 weeks ago
- ☆104Updated 4 months ago
- A preconfigured Velociraptor triage collector☆56Updated last week