Microsoft-365-Defender-Hunting-Queries
DISCONTINUED
h4cker
Our great sponsors
Microsoft-365-Defender-Hunting-Queries | h4cker | |
---|---|---|
14 | 4 | |
1,408 | 12,664 | |
- | 1.4% | |
9.0 | 9.5 | |
12 months ago | 6 days ago | |
Jupyter Notebook | Jupyter Notebook | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Microsoft-365-Defender-Hunting-Queries
h4cker
-
Cybersecurity Repositories
The Art of Hacking Series
- What's the "best" coding language to know/learn?
What are some alternatives?
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
Azure-Sentinel - Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Hydroxide - Penetration testing tool for games developed on the Roblox game engine.
vulscan - Advanced vulnerability scanning with Nmap NSE
security-onion - Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
RomBuster - RomBuster is a router exploitation tool that allows to disclosure network router admin password.
HELK - The Hunting ELK
Hunting-Queries-Detection-Rules - Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Vailyn - A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
hid-examples - Examples to accompany the book "Haskell in Depth"
dora - Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found