Welcome to the unified Microsoft Sentinel and Microsoft 365 Defender repository! This repository contains out of the box detections, exploration queries, hunting queries, workbooks, playbooks and much more to help you get ramped up with Microsoft Sentinel and provide you security content to secure your environment and hunt for threats. The hunting queries also include Microsoft 365 Defender hunting queries for advanced hunting scenarios in both Microsoft 365 Defender and Microsoft Sentinel. You can also submit to issues for any samples or resources you would like to see here as you onboard to Microsoft Sentinel. This repository welcomes contributions and refer to this repository's wiki to get started. For questions and feedback, please contact AzureSentinel@microsoft.com Resources: - Microsoft Sentinel documentation - Microsoft 365 Defender documentation - Security Community Webinars - Getting started with GitHub We value your feedback. Here are some channels to help surface your questions or feedback: - General product specific Q&A for SIEM and SOAR - Join in the Microsoft Sentinel Tech Community conversations - General product specific Q&A for XDR
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
A project sharing malicious URLs used for malware distribution to help protect networks.
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.