Kusto and Log Analytics MCP server help you execute a KQL (Kusto Query Language) query within an AI prompt, analyze, and visualize the data.
-
Updated
Dec 28, 2025 - Python
Kusto and Log Analytics MCP server help you execute a KQL (Kusto Query Language) query within an AI prompt, analyze, and visualize the data.
Detection rules and threat hunting queries in Defender XDR and Azure Sentinel
This repository contains detection and threat hunting queries created by NVISO’s CSIRT and SOC teams.
Maps Microsoft Defender XDR Schemas to a local Kustainer Data Explorer instance
Find potential local privilege escalation on windows with KQL
Large list of potential/known malicious browser extensions to hunt on
KQL Queries for Microsoft Sentinel and Microsoft Defender XDR
This lab is inspired by concepts and guidance from Josh Madakor’s Cyber Range course.
My home lab using Azure Sentinel and Ubuntu VM as a honeypot
To hunt for potential malicious extensions
This repository contains my labs for developing threat hunting skills by simulating real-world attack scenarios on Windows systems, focusing on system configuration tampering, unauthorised access detection, and network activity analysis.
AI-enhanced Azure SOC homelab for phishing detection & response, threat intelligence, and much more using Microsoft Sentinel, Defender XDR, and ANY.RUN.
My personal journal of CTF writeups, threat hunting investigations, and KQL experiments. Raw logs, step-by-step notes, and lessons learned from hands-on blue team and incident response challenges.
A Live Cloud SOC project using Azure Sentinel & Logic Apps to detect and automatically block RDP brute-force attacks from global botnets.
In this repository, you will find KQL queries that can be executed in Defender EDR.
Case-based KQL investigations (KC7 + homelab) for blue-team threat hunting and incident response.
A collection of Mitre ATT&CK aligned KQL detection, hunting, and audit queries for Defender XDR.
Add a description, image, and links to the kql-threathunting topic page so that developers can more easily learn about it.
To associate your repository with the kql-threathunting topic, visit your repo's landing page and select "manage topics."