Microsoft-365-Defender-Hunting-Queries VS hid-examples

Compare Microsoft-365-Defender-Hunting-Queries vs hid-examples and see what are their differences.

Microsoft-365-Defender-Hunting-Queries

Sample queries for Advanced hunting in Microsoft 365 Defender (by microsoft)

hid-examples

Examples to accompany the book "Haskell in Depth" (by bravit)
Our great sponsors
  • InfluxDB - Build time-series-based applications quickly and at scale.
  • SonarLint - Clean code begins in your IDE with SonarLint
  • SaaSHub - Software Alternatives and Reviews
Microsoft-365-Defender-Hunting-Queries hid-examples
14 1
1,408 214
- -
9.0 0.0
12 months ago 5 months ago
Jupyter Notebook Haskell
MIT License BSD 3-clause "New" or "Revised" License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

Microsoft-365-Defender-Hunting-Queries

Posts with mentions or reviews of Microsoft-365-Defender-Hunting-Queries. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-06-15.

hid-examples

Posts with mentions or reviews of hid-examples. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-05-20.

What are some alternatives?

When comparing Microsoft-365-Defender-Hunting-Queries and hid-examples you can also consider the following projects:

Azure-Sentinel - Cloud-native SIEM for intelligent security analytics for your entire enterprise.

parconc-examples - Sample code to accompany the book "Parallel and Concurrent Programming in Haskell"

h4cker - This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

security-onion - Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management

status-notifier-item - A Haskell implementation of the StatusNotifierItem protocol (https://www.freedesktop.org/wiki/Specifications/StatusNotifierItem/).

HELK - The Hunting ELK

Hunting-Queries-Detection-Rules - Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.

require - 🔌 Scrap your qualified import clutter

hdiff - Hash-based Diffing for AST's

no-role-annots - Role annotations without -XRoleAnnotations

hyperloglogplus - Haskell implementation of HyperLogLog++ & MinHash for efficient cardinality and intersection estimation