Kusto and Log Analytics MCP server help you execute a KQL (Kusto Query Language) query within an AI prompt, analyze, and visualize the data.
-
Updated
Mar 18, 2026 - Python
Kusto and Log Analytics MCP server help you execute a KQL (Kusto Query Language) query within an AI prompt, analyze, and visualize the data.
Detection rules and threat hunting queries in Defender XDR and Azure Sentinel
This repository contains detection and threat hunting queries created by NVISO’s CSIRT and SOC teams.
Microsoft Defender XDR KQL detections for RedSun, BlueHammer, UnDefend, and CVE-2026-33825-related Defender abuse behaviors.
Maps Microsoft Defender XDR Schemas to a local Kustainer Data Explorer instance
AI-enhanced Azure SOC homelab for phishing detection & response, threat intelligence, and much more using Microsoft Sentinel, Defender XDR, and ANY.RUN.
Documenting my threat hunting projects and experience as a Cybersecurity Analyst during my internship at LOGs N' PACIFIC. For educational purposes only.
KQL Queries for Microsoft Sentinel and Microsoft Defender XDR
A Live Cloud SOC project using Azure Sentinel & Logic Apps to detect and automatically block RDP brute-force attacks from global botnets.
A collection of Mitre ATT&CK aligned KQL detection, hunting, and audit queries for Defender XDR.
This repository contains my labs for developing threat hunting skills by simulating real-world attack scenarios on Windows systems, focusing on system configuration tampering, unauthorised access detection, and network activity analysis.
To hunt for potential malicious extensions
This lab is inspired by concepts and guidance from Josh Madakor’s Cyber Range course.
Case-based KQL investigations (KC7 + homelab) for blue-team threat hunting and incident response.
Find potential local privilege escalation on windows with KQL
My home lab using Azure Sentinel and Ubuntu VM as a honeypot
In this repository, you will find KQL queries that can be executed in Defender EDR.
My personal journal of CTF writeups, threat hunting investigations, and KQL experiments. Raw logs, step-by-step notes, and lessons learned from hands-on blue team and incident response challenges.
Add a description, image, and links to the kql-threathunting topic page so that developers can more easily learn about it.
To associate your repository with the kql-threathunting topic, visit your repo's landing page and select "manage topics."