You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Queries are organized by MITRE ATT&CK tactic. Each .kql file contains the full query with inline documentation including author notes, MITRE mappings, data source requirements, and tuning guidance.
Comprehensive phishing triage query correlating email delivery, URL clicks, attachments, endpoint file activity, reply behavior, and post-delivery ZAP actions into a single view per recipient.
Multi-signal detection for mass device wipe/retire/delete via Microsoft Intune, inspired by the Stryker/Handala attack. Combines static velocity thresholds, bulk operator detection, first-time operator baselining, UEBA anomaly correlation, and ML behavioral anomaly detection with tiered severity escalation.
Detects files written to USB drives with enrichment from fleet-wide PnP events, providing VID_PID, InstancePathId, and SerialNumberId for Intune device control cross-referencing.
Detects periodic beaconing behavior from browser processes to external domains, designed to catch automated data exfiltration by malicious extensions at ~30-minute intervals.
Configurable query to track and deduplicate alert emails from an MSSP, using session logic to group email bursts and extract case numbers from portal URLs.
Multi-layer aggregation of Imperva WAF blocked requests, enriched with ASN/organization data, rolling up from pattern → attack type → IP → organization for threat analysis.
Identifies accounts with the highest email volume and threat exposure, including a key risk metric for threats that bypassed filtering and reached user inboxes.
🛠️ Platforms
Microsoft Sentinel (primary — uses TimeGenerated)
Microsoft Defender XDR Advanced Hunting (replace TimeGenerated with Timestamp where noted)
📝 Usage
Each query is self-contained with inline documentation. Copy the .kql file contents directly into your Sentinel Logs or Defender Advanced Hunting query editor. Review the configuration sections at the top of each query and adjust parameters (time windows, thresholds, exclusion lists) for your environment before deploying.
📄 License
These queries are shared for the benefit of the security community. Use and modify them freely. Attribution is appreciated but not required.
About
This repo will contain hunting and detection queries in the Kusto Query Language (KQL). I will eventually add queries that are in the Sigma language due the ability to translate them into any querying language.