MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity
☆94Jan 11, 2021Updated 5 years ago
Alternatives and similar repositories for SentinelOne-ATTACK-Queries
Users that are interested in SentinelOne-ATTACK-Queries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository of SentinelOne Deep Visibility queries.☆136Jun 30, 2021Updated 4 years ago
- SentinelOne STAR Rules☆75Feb 11, 2025Updated last year
- ☆71Jun 20, 2023Updated 2 years ago
- Web based S1 query navigator for one-click threat hunting☆26Dec 18, 2020Updated 5 years ago
- PowerShell module for SentinelOne API☆70Jun 26, 2023Updated 2 years ago
- This will be a repository of SentinelOne Deep Visibility queries both the Standard Queries and the Power Queries. Most of these queries w…☆33Oct 15, 2024Updated last year
- PowerShell module for SentinelOne API☆28Mar 8, 2021Updated 5 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 6 months ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆806Jan 14, 2026Updated 2 months ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- Beginners Guide to Hunting for Threats☆18Apr 26, 2025Updated 10 months ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Renamed to Free EDR to avoid confusion with Comodo's project☆26May 29, 2023Updated 2 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Hunt malware with Volatility☆49Mar 3, 2026Updated 3 weeks ago
- ☆16Aug 29, 2025Updated 6 months ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- ☆172Mar 16, 2026Updated last week
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 4 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- ☆19Nov 26, 2024Updated last year
- ☆48Mar 16, 2026Updated last week
- ☆13Dec 21, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Tools for hunting for threats.☆599Apr 30, 2025Updated 10 months ago