Kusto and Log Analytics MCP server help you execute a KQL (Kusto Query Language) query within an AI prompt, analyze, and visualize the data.
- Updated
- Python
![]() |
VOOZH | about |
Kusto and Log Analytics MCP server help you execute a KQL (Kusto Query Language) query within an AI prompt, analyze, and visualize the data.
Detection rules and threat hunting queries in Defender XDR and Azure Sentinel
This repository contains detection and threat hunting queries created by NVISO’s CSIRT and SOC teams.
Maps Microsoft Defender XDR Schemas to a local Kustainer Data Explorer instance
Documenting my threat hunting projects and experience as a Cybersecurity Analyst during my internship at LOGs N' PACIFIC. For educational purposes only.
AI-enhanced Azure SOC homelab for phishing detection & response, threat intelligence, and much more using Microsoft Sentinel, Defender XDR, and ANY.RUN.
Large list of potential/known malicious browser extensions to hunt on
This lab is inspired by concepts and guidance from Josh Madakor’s Cyber Range course.
Case-based KQL investigations (KC7 + homelab) for blue-team threat hunting and incident response.
This repository contains my labs for developing threat hunting skills by simulating real-world attack scenarios on Windows systems, focusing on system configuration tampering, unauthorised access detection, and network activity analysis.
A collection of Mitre ATT&CK aligned KQL detection, hunting, and audit queries for Defender XDR.
KQL Queries for Microsoft Sentinel and Microsoft Defender XDR
To hunt for potential malicious extensions
Find potential local privilege escalation on windows with KQL
My home lab using Azure Sentinel and Ubuntu VM as a honeypot
A Live Cloud SOC project using Azure Sentinel & Logic Apps to detect and automatically block RDP brute-force attacks from global botnets.
In this repository, you will find KQL queries that can be executed in Defender EDR.
My personal journal of CTF writeups, threat hunting investigations, and KQL experiments. Raw logs, step-by-step notes, and lessons learned from hands-on blue team and incident response challenges.
Add a description, image, and links to the kql-threathunting topic page so that developers can more easily learn about it.
To associate your repository with the kql-threathunting topic, visit your repo's landing page and select "manage topics."