h4cker
Azure-Sentinel
Our great sponsors
h4cker | Azure-Sentinel | |
---|---|---|
4 | 37 | |
16,518 | 4,271 | |
3.4% | 3.9% | |
9.3 | 10.0 | |
15 days ago | 3 days ago | |
Jupyter Notebook | Jupyter Notebook | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
h4cker
- Ciberseguridad / hacking etico
-
Cybersecurity Repositories
The Art of Hacking Series
- What's the "best" coding language to know/learn?
-
How to use a home lab to study Penetration Testing?
https://github.com/The-Art-of-Hacking/h4cker is a good repo
Azure-Sentinel
- Playbook/Guide for responding to specific incident
-
Create Sentinel Incident through MS Forms and Automate?
Azure-Sentinel/Playbooks/CreateIncident-SharedMailbox at master · Azure/Azure-Sentinel · GitHub
-
Correlate what tables/logs/connectors are being used by active analytics (detection's)
They recently reorganized the GitHub: https://github.com/Azure/Azure-Sentinel/blob/master/Workbooks/LogSourcesAndAnalyticRulesCoverage.json
-
Threat Hunting
Have you checkout out the azure playbook templates? https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks
-
Message patterns for AzureFirewallNetworkRule log category
The best option I could find so far is inferring the format by reading the source code at https://github.com/Azure/Azure-Sentinel/blob/master/Parsers/AzureFirewall/AzureFirewallNetworkRule.kql.
-
What are some good custom detection rules for Sentinel?
There is a ton on Github. Have a look here -> https://github.com/Azure/Azure-Sentinel/wiki
-
Alert rules for Active Directory domain controllers hosted in Azure
Also see the Sentinel repository on GitHub for a ton of queries to reference: https://github.com/Azure/Azure-Sentinel
-
Playbooks
All the json files are stored in MS Sentinels github repo: https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks. You do not need to export them yourself. You can copy the raw json file from the repository.
- Use Case automation
-
Converting syslog to CEF format for Sentinel ingestion
here you can find various other types: https://github.com/Azure/Azure-Sentinel/tree/master/Parsers
What are some alternatives?
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Microsoft-365-Defender-Hunting-Queries - Sample queries for Advanced hunting in Microsoft 365 Defender
RomBuster - RomBuster is a router exploitation tool that allows to disclosure network router admin password.
hid-examples - Examples to accompany the book "Haskell in Depth"
Hydroxide - Lua runtime introspection and network capturing tool for games on the Roblox engine.
CyberThreatHunting - A collection of resources for Threat Hunters - Sponsored by Falcon Guard
vulscan - Advanced vulnerability scanning with Nmap NSE
cybersecurity-resources - Resources for learning about cybersecurity and CTFs
dora - Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
azure-docs - Open source documentation of Microsoft Azure