Web based S1 query navigator for one-click threat hunting
☆25Dec 18, 2020Updated 5 years ago
Alternatives and similar repositories for SentinelOne-Query-Navigator
Users that are interested in SentinelOne-Query-Navigator are comparing it to the libraries listed below
Sorting:
- Repository of SentinelOne Deep Visibility queries.☆135Jun 30, 2021Updated 4 years ago
- ☆17Jan 22, 2026Updated last month
- ☆69Jun 20, 2023Updated 2 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- ☆11Feb 9, 2023Updated 3 years ago
- ☆32Feb 3, 2026Updated 3 weeks ago
- Open Authorization API (OAA) development libraries, connectors and resources.☆17Jan 9, 2025Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Ansible-based deployment automation for the OpenConext platform☆14Updated this week
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Getting started guides to deploy the SIGHUP Distribution (SD) in different environments☆15Updated this week
- The purpose this solution provides is automated notifications for how many passed, not passed, failed, and warning findings for each memb…☆10Dec 5, 2022Updated 3 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- ☆12Jun 17, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Go implementation of OpenID Federation☆12Feb 16, 2026Updated last week
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Feb 20, 2026Updated last week
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last week
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- TBD - The Tmux Bash Debugger☆12Oct 23, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- RGCN model for real-time fraud detection☆11Jan 27, 2023Updated 3 years ago
- 💪 Working 8 hours a day in front of a computer exposes you to specific health challenges. This guide provides community tips on improvin…☆12Aug 23, 2023Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 2 weeks ago
- 🔐 Google Cloud Workload Identity Federation Examples and How-To☆12Nov 24, 2025Updated 3 months ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- Keycloak gRPC extension☆12Mar 2, 2023Updated 2 years ago
- ☆11Jan 3, 2023Updated 3 years ago
- Update an ECS service to use a new Docker image☆13Feb 21, 2026Updated last week
- ☆11Jan 17, 2025Updated last year
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- an experimental implementation of Burrow's delta in Python 3☆12Jun 6, 2017Updated 8 years ago
- [Deprecated] This solution helps customers reduce operational complexity and enables administrators to quickly create manual, event-based…☆14Mar 8, 2023Updated 2 years ago
- Design documents and interoperability tests for Interoperable RA-TLS projects☆13Jan 8, 2024Updated 2 years ago
- Privacy-first desktop AI companion with 5 pillars: unified chat, OpenClaw Gateway, evolving avatar, desktop control, and vision. Auth0 wi…☆19Updated this week