microsoft / msticLinks
Microsoft Threat Intelligence
☆189Updated last week
Alternatives and similar repositories for mstic
Users that are interested in mstic are comparing it to the libraries listed below
Sorting:
- ☆93Updated this week
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago
- A guide to using Azure Data Explorer and KQL for DFIR☆111Updated 3 years ago
- Public repo to sync with security-pr☆237Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆124Updated 4 years ago
- OSSEM Data Dictionaries☆62Updated 7 months ago
- Advanced Hunting Queries for Microsoft Security Products☆108Updated 2 years ago
- KQL queries for Advanced Hunting☆173Updated 5 years ago
- Repository with Sample KQL Query examples for Threat Hunting☆215Updated 2 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆136Updated last year
- PowerShell module for Office 365 and Azure log collection☆271Updated 3 weeks ago
- OneDriveExplorer is a command line and GUI based application for reconstructing the folder structure of OneDrive from the <UserCid>.dat a…☆213Updated 2 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆260Updated 3 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆116Updated 4 months ago
- Security Scripts and Sources for daily usage.☆65Updated 2 months ago
- Microsoft Sentinel SOC Operations☆260Updated last year
- Full of public notes and Utilities☆128Updated 6 months ago
- KQL queries for cyber defense and for solving daily issues☆53Updated last month
- ☆42Updated last month
- Repository with Sentinel Analytics Rules, Hunting Queries and helpful external data sources.☆122Updated this week
- Repository to publish sample use cases, templates, solutions, automations for Microsoft Defender Threat Intelligence (MDTI) product☆79Updated 11 months ago
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆88Updated last year
- A lab environment for learning about MSTICPy☆38Updated 2 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆43Updated 4 years ago
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆98Updated last month
- Rules generated from our investigations.☆197Updated 2 months ago
- Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenant.☆129Updated 2 months ago
- MDE relies on some of the Audit settings to be enabled☆98Updated 3 years ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆37Updated last week
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆261Updated 4 years ago