DEPRECATED -> GO TO https://github.com/microsoft/Microsoft-threat-protection-Hunting-Queries
☆20Apr 22, 2020Updated 5 years ago
Alternatives and similar repositories for MTP-AHQ
Users that are interested in MTP-AHQ are comparing it to the libraries listed below
Sorting:
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- ☆30Nov 11, 2024Updated last year
- ☆10Oct 25, 2020Updated 5 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,053Feb 17, 2022Updated 4 years ago
- ☆50Jul 7, 2024Updated last year
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- Microsoft Security Guidance☆251May 16, 2024Updated last year
- Microsoft Defender Advanced Threat Protection☆49Jan 28, 2026Updated last month
- Powershell module for Microsoft Cloud App Security (MCAS)☆10Mar 19, 2021Updated 5 years ago
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- ☆20Sep 3, 2021Updated 4 years ago
- KQL queries for Advanced Hunting☆177Jan 16, 2020Updated 6 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- MDATP☆455Jul 20, 2024Updated last year
- ☆80Feb 4, 2026Updated last month
- M365 MDATP Live Response sample scripts☆82Nov 1, 2024Updated last year
- Repository to publish sample use cases, templates, solutions, automations for Microsoft Defender Threat Intelligence (MDTI) product☆80Sep 9, 2024Updated last year
- A lab environment for learning about MSTICPy☆38Feb 3, 2023Updated 3 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Guidance and collateral for troubleshooting and managing Azure Sentinel data costs.☆28Oct 9, 2023Updated 2 years ago
- ☆20May 10, 2023Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- A set of icons for the Viva services☆25Aug 8, 2023Updated 2 years ago
- A repo for sample MDATP Power BI Templates☆207Jun 15, 2021Updated 4 years ago
- ☆29Nov 13, 2020Updated 5 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- CVE-2020-0618 Honeypot☆31Mar 3, 2020Updated 6 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- Common Training Content for Microsoft One Commercial Partner Scale Enablement Team☆13Feb 12, 2021Updated 5 years ago
- This config file will automatically convert a temporary Windows Sandbox environment into a Flare VM for malware analysis.☆11Jan 3, 2025Updated last year
- The patterns for a foundational implimenation of Azure Foundation.☆21Sep 17, 2018Updated 7 years ago
- ☆349Mar 19, 2021Updated 5 years ago