Microsoft-365-Defender-Hunting-Queries
DISCONTINUED
security-onion
DISCONTINUED
Our great sponsors
Microsoft-365-Defender-Hunting-Queries | security-onion | |
---|---|---|
14 | 3 | |
1,408 | 2,900 | |
- | - | |
9.0 | 3.9 | |
12 months ago | almost 2 years ago | |
Jupyter Notebook | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Microsoft-365-Defender-Hunting-Queries
security-onion
-
Just a student who wants to start a carrier in Forensic or pentest
https://github.com/Security-Onion-Solutions/security-onion for play with blue team tools
- FOSS SIEM for homelabs?
What are some alternatives?
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
Sending your docker logs - Sending logs from docker containers to Logit.io
cyberchef-recipes - A list of cyber-chef recipes and curated links
Azure-Sentinel - Cloud-native SIEM for intelligent security analytics for your entire enterprise.
snort-rules - An UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases. [UnavailableForLegalReasons - Repository access blocked]
h4cker - This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
HELK - The Hunting ELK
Hunting-Queries-Detection-Rules - Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
awesome-pentest - A collection of awesome penetration testing resources, tools and other shiny things
wazuh-ruleset - Wazuh - Ruleset
hid-examples - Examples to accompany the book "Haskell in Depth"