Hunting-Queries-Detection-Rules
Linux Security
Our great sponsors
Hunting-Queries-Detection-Rules | Linux Security | |
---|---|---|
7 | 3 | |
997 | 1 | |
- | - | |
9.3 | 1.7 | |
5 days ago | about 1 year ago | |
Python | ||
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Hunting-Queries-Detection-Rules
- Advanced Hunting queries every admin should use
- Hunting Querie into a Detection rule
- MS Sentinel Analytics & KQL
- Analytical rules
- MDE Repointing Frequency
-
Least occurrence in MDE
This will be the query that you are looking for. I do have a lot more queries if you are interested: https://github.com/Bert-JanP/Hunting-Queries-Detection-Rules
- Must have analytic rules
Linux Security
What are some alternatives?
Microsoft-365-Defender-Hunting-Queries - Sample queries for Advanced hunting in Microsoft 365 Defender
macOS Security - macOS from a blue perspective 🧢
chatgpt-raycast - ChatGPT raycast extension
AdGuard-Home-Whitelist - A strict curated whitelist for AdGuard Home.
kusto-queries - example queries for learning the kusto language
windows_security - Is Windows a joke or are you? 🧢
Sentinel-Queries - Collection of KQL queries
yoga-slim7-ubuntu - Notes and instruction about running Linux (Ubuntu) on Lenovo Yoga Slim 7 (AMD)
AzureHunter - A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
Fedora-KDE-Yubikey-U2F-2FA-Logins-Guide - Guide to setup a Yubikey for Fedora KDE as 2FA using U2F for the SDDM login screen, lock screen, sudo and su.
KQL - Threat Hunting query in Microsoft 365 Defender, XDR. Provide out-of-the-box KQL hunting queries - App, Email, Identity and Endpoint.
awesome-security-hardening - A collection of awesome security hardening guides, tools and other resources