inodee / spl-to-kql
The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects requiring both technologies (Splunk and Azure/Sentinel) or any other hybrid environments. Feel free to add/suggest entries.
☆41Updated 4 years ago
Alternatives and similar repositories for spl-to-kql:
Users that are interested in spl-to-kql are comparing it to the libraries listed below
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆53Updated last year
- ☆72Updated 6 months ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆32Updated 2 months ago
- Advanced Hunting Queries for Microsoft Security Products☆106Updated 2 years ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆36Updated 5 months ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Notes on responding to security breaches relating to Azure AD☆110Updated 3 years ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Updated 3 years ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆63Updated 3 weeks ago
- A guide to using Azure Data Explorer and KQL for DFIR☆102Updated 2 years ago
- ☆30Updated last year
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago
- KQL queries for cyber defense and for solving daily issues☆49Updated 2 months ago
- Jupyter notebooks☆24Updated 4 years ago
- ☆41Updated 2 years ago
- ☆41Updated 3 years ago
- Hunting Queries for Defender ATP☆81Updated this week
- ☆47Updated last week
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Updated 3 years ago
- ☆28Updated 7 months ago
- GitHub action for validating Microsoft Sentinel detection rules☆13Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated last month
- Repository to publish sample use cases, templates, solutions, automations for Microsoft Defender Threat Intelligence (MDTI) product☆79Updated 7 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated last year
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆90Updated 2 months ago
- Full of public notes and Utilities☆98Updated 2 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago