Popular repositories Loading
-
Windows-Forensic-Examination-and-Threat-Hunting
Windows-Forensic-Examination-and-Threat-Hunting PublicVarious commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can also be used to create a baseline for your environment.For the…
-
Incident_Response_Script
Incident_Response_Script PublicSmall Incident Response Powershell script that collects various data from the system.Good alternative to run on a system while waiting for an approved AV scan( or instead of a scan)
PowerShell 4
-
MicrosoftDefender-DiscordCNC
MicrosoftDefender-DiscordCNC PublicThreat-Hunting KQL query which identifies machines that utilize powershell, cmd or wmic to connect to any URL that includes “cdn.discordapp.com” ,where the action was initiated by a script executio…
-
MicrosoftDefender-Kaseya_IOCs
MicrosoftDefender-Kaseya_IOCs PublicSimple KQL query that can be run either in MD for Endpoint (Threat hunting or Custom indicator) or in Azure Sentinel (Threat hunting or analytics rule).It's looking for 4 known IOCs related to the …
-
MicrosoftDefender-Egregor
MicrosoftDefender-Egregor PublicCustom made Query which you can run in your Microsoft Defender - Advanced Hunting tool to look for network activity related to Egregor Ransomware.
If the problem persists, check the GitHub status page or contact support.