Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview
☆40Apr 8, 2021Updated 5 years ago
Alternatives and similar repositories for Microsoft-Defender-Security-Center-Hunting-Queries
Users that are interested in Microsoft-Defender-Security-Center-Hunting-Queries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Aug 21, 2022Updated 3 years ago
- Advanced Hunting Queries for Microsoft Security Products☆108Jan 10, 2023Updated 3 years ago
- Windows Defender ATP - Advanced Hunting Queries☆22Apr 12, 2018Updated 8 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 5 years ago
- ☆21Mar 8, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10Dec 24, 2022Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- ☆20Oct 23, 2020Updated 5 years ago
- Defender XDR Advanced Hunting Queries (MDE, MDAV, Device Discovery)☆13Apr 20, 2026Updated 3 weeks ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆31Apr 23, 2024Updated 2 years ago
- Repository with Sample KQL Query examples for Threat Hunting☆218Sep 1, 2022Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- Microsoft Cloud App Security labs☆14Dec 17, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆13Feb 6, 2018Updated 8 years ago
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,065Feb 17, 2022Updated 4 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Repository to publish sample use cases, templates, solutions, automations for Microsoft Defender Threat Intelligence (MDTI) product☆82Sep 9, 2024Updated last year
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Nov 30, 2021Updated 4 years ago
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 6 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Threat Hunting queries of multiple platforms☆68Apr 30, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A repo for sample MDATP Power BI Templates☆208Jun 15, 2021Updated 4 years ago
- ☆14Mar 20, 2026Updated last month
- A tool for start/stop Microsoft Hosted Network Virtual Adapter.☆31Apr 21, 2023Updated 3 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- Splunk TA for sending completion requests to ChatGPT☆27May 18, 2024Updated 2 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- ☆72Oct 21, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11Nov 13, 2024Updated last year
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Azure AD Incident Response☆28Oct 8, 2021Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- Documentation and supporting script sample for Windows Exploit Guard☆168Sep 8, 2025Updated 8 months ago
- Create a Word document showing your Sentinel configuration☆14Nov 7, 2023Updated 2 years ago
- A guide to using Azure Data Explorer and KQL for DFIR☆124May 16, 2022Updated 4 years ago