MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity
☆94Jan 11, 2021Updated 5 years ago
Alternatives and similar repositories for SentinelOne-ATTACK-Queries
Users that are interested in SentinelOne-ATTACK-Queries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository of SentinelOne Deep Visibility queries.☆135Jun 30, 2021Updated 4 years ago
- SentinelOne STAR Rules☆76Feb 11, 2025Updated last year
- ☆73Jun 20, 2023Updated 2 years ago
- Web based S1 query navigator for one-click threat hunting☆26Dec 18, 2020Updated 5 years ago
- PowerShell module for SentinelOne API☆71Jun 26, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This will be a repository of SentinelOne Deep Visibility queries both the Standard Queries and the Power Queries. Most of these queries w…☆35Apr 29, 2026Updated last week
- PowerShell module for SentinelOne API☆29Mar 8, 2021Updated 5 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 7 months ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆812Jan 14, 2026Updated 3 months ago
- Some Python SentinelOne API request examples and UI☆16May 16, 2018Updated 7 years ago
- Beginners Guide to Hunting for Threats☆19Apr 26, 2025Updated last year
- Contains research.splunk.com site code☆11Apr 10, 2024Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Renamed to Free EDR to avoid confusion with Comodo's project☆26May 29, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Hunt malware with Volatility☆51Mar 3, 2026Updated 2 months ago
- ☆16Aug 29, 2025Updated 8 months ago
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- ☆176Apr 24, 2026Updated last week
- A list of RMMs designed to be used in automation to build alerts☆119Nov 9, 2025Updated 5 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- ☆19Nov 26, 2024Updated last year
- ☆50Apr 4, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Dec 21, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Tools for hunting for threats.☆601Apr 30, 2025Updated last year