Skip to content

A collection of powerful AQL (Ariel Query Language) queries for threat hunting, incident investigation, and security monitoring in IBM QRadar.

License

Notifications You must be signed in to change notification settings

System-CTL/QRadar-AQL-Queries

ย 
ย 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

57 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

QRadar AQL Threat Hunting and General Investigation Queries

A collection of powerful AQL (Ariel Query Language) queries for threat hunting, incident investigation, and security monitoring in IBM QRadar.

๐Ÿ“Œ Overview

This repository contains curated AQL queries designed to help SOC analysts, threat hunters, and security researchers:

  • Detect suspicious activities
  • Investigate security incidents
  • Hunt for advanced threats
  • Monitor key security indicators

1. Living-of-the-Land Binaries

Select sourceip, destinationip, "Process Name" FROM events WHERE "Process Name" IMATCHES '.*atbroker\.exe.*|.*bash\.exe.*|.*bitsadmin\.exe.*|.*certutil\.exe.*|.*cmdkey\.exe.*|.*cmstp\.exe.*|.*control\.exe.*|.*csc\.exe.*|.*cscript\.exe.*|.*dfsvc\.exe.*|.*diskshadow\.exe.*|.*dnscmd\.exe.*|.*esentutl\.exe.*|.*eventvwr\.exe.*|.*expand\.exe.*|.*extexport\.exe.*|.*extrac32\.exe.*|.*findstr\.exe.*|.*forfiles\.exe.*|.*ftp\.exe.*|.*gpscript\.exe.*|.*hh\.exe.*|.*ie4uinit\.exe.*|.*ieexec\.exe.*|.*infdefaultinstall\.exe.*|.*installutil\.exe.*|.*makecab\.exe.*|.*reg\.exe.*|.*print\.exe.*|.*presentationhost\.exe.*|.*pcwrun\.exe.*|.*pcalua\.exe.*|.*odbcconf\.exe.*|.*msiexec\.exe.*|.*mshta\.exe.*|.*msdt\.exe.*|.*msconfig\.exe.*|.*msbuild\.exe.*|.*mmc\.exe.*|.*microsoft.workflow.compiler\.exe.*|.*mavinject\.exe.*|.*vsjitdebugger\.exe.*|.*tracker\.exe.*|.*te\.exe.*|.*sqltoolsps\.exe.*|.*sqlps\.exe.*|.*sqldumper\.exe.*|.*rcsi\.exe.*|.*msxsl\.exe.*|.*msdeploy\.exe.*|.*mftrace\.exe.*|.*dxcap\.exe.*|.*dnx\.exe.*|.*csi\.exe.*|.*cdb\.exe.*|.*bginfo\.exe.*|.*appvlp\.exe.*|.*xwizard\.exe.*|.*wsreset\.exe.*|.*wscript\.exe.*|.*wmic\.exe.*|.*wab\.exe.*|.*verclsid\.exe.*|.*syncappvpublishingserver\.exe.*|.*scriptrunner\.exe.*|.*schtasks\.exe.*|.*sc\.exe.*|.*runscripthelper\.exe.*|.*runonce\.exe.*|.*rundll32\.exe.*|.*rpcping\.exe.*|.*replace\.exe.*|.*regsvr32\.exe.*|.*regsvcs\.exe.*|.*register-cimprovider\.exe.*|.*regedit\.exe.*|.*regasm\.exe.*|' GROUP BY "Process Name",sourceip LAST 3 DAYS

2. RDP over a reverse SSH Tunnel

Source MENASEC Blog

select sourceip, sourceport, destinationip, destinationport from events where eventid=5156 and (sourceport=3389 or destinationport=3389) and (INCIDR('127.0.0.0/8',sourceip) OR INCIDR('127.0.0.0/8',destinationip)) GROUP BY sourceip LAST 24 HOURS

3. Spawning Windows Shell

Source : SIGMA Rules

SELECT UTF8(payload) as search_payload from events where (((LOGSOURCETYPENAME(devicetype) ilike 'Microsoft Windows Security Event Log')) and (("EventID"='4688' and (search_payload ilike '%\cmd.exe' or search_payload ilike '%\powershell.exe' or search_payload ilike '%\wscript.exe' or search_payload ilike '%\cscript.exe'or search_payload ilike '%\sh.exe' or search_payload ilike '%\bash.exe' or search_payload ilike '%\scrcons.exe' or search_payload ilike '%\schtasks.exe' or search_payload ilike '%\regsvr32.exe' or search_payload ilike '%\mshta.exe' or search_payload ilike '%\rundll32.exe' or search_payload ilike '%\msiexec.exe')))) GROUP BY sourceip LAST 3 DAYS

4. Potential DNS Tunneling

Source : N/A
Author : Abrar Hussain

Parameters Description
DNS_logsource_type Add your DNS logsource_type name here
NOT INCIDR('192.X.X.0/20',sourceip) Exclude specific ip range e.g. Guest network IP Range
dns_query_field_name Add your DNS Query field name here e.g. google.com
STRLEN("<dns_query_field_name>")>250 Calculate the Lenght of DNS Query and use regular expression to check DNS query greater than 250 charaters.
SELECT LOGSOURCENAME(logsourceid),sourceip, destinationip, "<dns_url_query_field_name>","DNS Error Code",STRLEN("<dns_query_field_name>") FROM events
WHERE (LOGSOURCETYPENAME(devicetype)) ILIKE '%<DNS_logsource_type>%'
AND STRLEN("<dns_query_field_name>")>250 AND NOT INCIDR('192.X.X.0/20',sourceip)
AND "<dns_query_field_name>" IS NOT NULL
AND "<dns_query_field_name>" NOT ILIKE '%<excluded_url_1>%'
AND "<dns_query_field_name>" NOT ILIKE '%<excluded_url_2>%'
START PARSEDATETIME('8 day ago')

5. Explicit Credential - Windows

Source : N/A
Author : Abrar Hussain

SELECT DATEFORMAT(devicetime,'yyyy-MM-dd hh:mm') AS "TimeStamp",LOGSOURCENAME(logsourceid) AS "LogSource Name",QIDNAME(qid) As "Event Name" ,"Process Name",sourceip AS "Source IP",sourceport AS "Source Port",destinationip AS "Destination IP",destinationport AS "Destination Port",username AS "Username","Account Name" AS "Account Name" FROM events
WHERE (LOGSOURCETYPENAME(devicetype)) ILIKE '%Microsoft Windows%'
AND qidEventId=4648
AND username!="Account Name"
AND username NOT LIKE '%$'
AND "Account Name" NOT LIKE '%$'
AND username!='-' AND "Account Name"!='-'
AND username IS NOT NULL
AND "Account Name" IS NOT NULL
AND username NOT IN ('1st_username_exclusion')
AND username NOT IN ('2nd_username_exclusion')
START PARSEDATETIME('1 day ago')

6. Inbound RDP Connection - Firewall

Source : N/A
Author : Abrar Hussain

Parameters Description
Firewall_Type_Name_1 Add your 1st Firewall logsource_type name here
Firewall_Type_Name_2 Add your 2nd Firewall logsource_type name here
  • (sourceIP BETWEEN '10.0.0.0' AND '10.255.255.255')
  • (sourceIP BETWEEN '172.16.0.0' AND '172.31.255.255')
  • ( sourceIP BETWEEN '192.168.0.0' AND '192.168.255.255')
Private IP Range
SELECT DATEFORMAT(devicetime,'yyyy-MM-dd hh:mm') AS "TimeStamp",LOGSOURCENAME(logsourceid) AS "LogSource Name",QIDNAME(qid) As "Event Name" ,"Logon Process" AS "Logon Process","Process Name",sourceip AS "Source IP",sourceport AS "Source Port",destinationip AS "Destination IP",destinationport AS "Destination Port",username AS "Username","Account Name" AS "Account Name", "Logon Type" AS "Logon Type" ,qideventid AS "Event ID"  FROM events
WHERE (LOGSOURCETYPENAME(deviceType) ILIKE '%Firewall_Type_Name_1%' OR LOGSOURCETYPENAME(deviceType) ILIKE '%Firewall_Type_Name_2%')
AND  NOT (sourceIP BETWEEN '10.0.0.0' AND '10.255.255.255')
AND NOT (sourceIP BETWEEN '172.16.0.0' AND '172.31.255.255')
AND NOT ( sourceIP BETWEEN '192.168.0.0' AND '192.168.255.255')
AND destinationport=3389
START PARSEDATETIME('20 days ago')

7. Outbound RDP Connection - Firewall

Source : N/A
Author : Abrar Hussain

Parameters Description
Firewall_Type_Name_1 Add your 1st Firewall logsource_type name here
Firewall_Type_Name_2 Add your 2nd Firewall logsource_type name here
SELECT DATEFORMAT(devicetime,'yyyy-MM-dd hh:mm') AS "TimeStamp",LOGSOURCENAME(logsourceid) AS "LogSource Name",QIDNAME(qid) As "Event Name" ,"Logon Process" AS "Logon Process","Process Name",destinationip AS "Source IP",sourceport AS "Source Port",destinationip AS "Destination IP",destinationport AS "Destination Port",username AS "Username","Account Name" AS "Account Name", "Logon Type" AS "Logon Type" ,qideventid AS "Event ID"  FROM events
WHERE (LOGSOURCETYPENAME(deviceType) ILIKE '%Firewall_Type_Name_1%' OR LOGSOURCETYPENAME(deviceType) ILIKE '%Firewall_Type_Name_2%')
AND  NOT (destinationip BETWEEN '10.0.0.0' AND '10.255.255.255')
AND NOT (destinationip BETWEEN '172.16.0.0' AND '172.31.255.255')
AND NOT ( destinationip BETWEEN '192.168.0.0' AND '192.168.255.255')
AND destinationport=3389
START PARSEDATETIME('20 days ago')

8. Potential DNS ZONE Transfer

Source : N/A
Author : Abrar Hussain

Parameters Description
DNS_LOGSOURECE_TYPE_NAME Add your DNS logsource_type name here
SELECT LOGSOURCENAME(logsourceid),sourceip, destinationip,"Requested Query" AS "DNS Query","DNS Request Type" AS "DNS Record Type", "Protocol Name" AS "Protocol", "Error Code" AS "Query Status"
FROM events
WHERE (LOGSOURCENAME(logsourceid)) ILIKE '%DNS_LOGSOURECE_TYPE_NAME%'
AND "Query Response Status" ILIKE '%NOERROR%'
AND "DNS Request Type" ILIKE '%AXFR%'
START PARSEDATETIME('8 day ago')

9. Svchost.exe Abused - Abnormal Process Path

Source : N/A
Author : Abrar Hussain

Parameters Description
Microsoft Windows Log Add your Microsoft Windows Security logsource_type name here

Expected Path: C:\Windows\System32\svchost.exe

SELECT DATEFORMAT(devicetime,'yyyy-MM-dd hh:mm'),"qidEventId" as 'Event ID',"Process Name",destinationport,username,"Account Name",LOGSOURCENAME(logsourceid),sourceip, destinationip, "Process Path"
FROM events
WHERE (LOGSOURCETYPENAME(devicetype)) ILIKE '%Microsoft Windows Log%'
AND qidEventId=4688
AND "Process Name" ILIKE '%svchost.exe%'
GROUP BY "Process Path"
START PARSEDATETIME('8 day ago')

10. Svchost.exe Abused - Abnormal Parent

Source : N/A
Author : Abrar Hussain

Parameters Description
Microsoft Windows Log Add your Microsoft Windows Security logsource_type name here

Expected Parent Process: C:\Windows\System32\services.exe
Expected False Positive, Parent Process: MsMpEng.exe

SELECT DATEFORMAT(devicetime,'yyyy-MM-dd hh:mm'),"qidEventId" as 'Event ID',"Process Name",destinationport,username,"Account Name",LOGSOURCENAME(logsourceid),sourceip, destinationip, "Process Path","Parent Process Name" FROM events
WHERE (LOGSOURCETYPENAME(devicetype)) ILIKE '%Microsoft Windows%'
AND qidEventId=4688
AND "Process Name" ILIKE '%svchost.exe%'
AND "Parent Process Name" NOT ILIKE '%Services.exe%'
AND "Parent Process Name" IS NOT NULL
AND "Parent Process Name" NOT ILIKE '%MsMpEng.exe%'
START PARSEDATETIME('7 day ago')

11. Default Account Enabled

Source : N/A
Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here
SELECT * FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4722 
AND (username ILIKE 'guest' OR username ILIKE 'defaultaccount' OR username ILIKE 'administrator')) 
LAST 15 DAYS

12. Default Account Enabled - Command Line

Source : N/A
Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here
SELECT * FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4688 
AND ("Command" ILIKE 'active' or "Command" ILIKE 'Enabled' or "Command" ILIKE 'set' or "Command" ILIKE 'disabled' )) 
LAST 5 DAYS

13. Scheduled Task - Command Line

Source : N/A
Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here
SELECT * FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4688 
AND ("Command" ILIKE 'create' or "Command" ILIKE '/SC' or "Command" ILIKE '/TN' )) 
LAST 5 DAYS

14. BITSadmin - Command Line

Source : N/A
Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here
SELECT * FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4688 
AND ("Command" ILIKE '/transfer' or "Command" ILIKE '/priority' or "Command" ILIKE '/download' )) 
LAST 5 DAYS

15. Potential DNS Tunneling - Base64 Encoding

Source : N/A
Author : Abrar Hussain

Parameters Description
DNS_logsource_type Add your DNS logsource_type name here
DNS_Request_Type DNS Record Types e.g. TXT, AAAA, CNAME
SELECT *
FROM events
WHERE LOGSOURCETYPENAME(devicetype) ILIKE '%DNS_logsource_type%'
AND "DNS_Request_Type" ILIKE 'TXT'
AND BASE64(payload)=TRUE
LAST 5 DAYS 

16. Common Malware Paths - Hunting

Source : N/A
Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here

Expected False Positive, Process Names: MpCmdRun.exe, DismHost.exe, OpenHandleCollector.exe, whitelist the approved process names

SELECT LOGSOURCENAME(logsourceid) AS "Logsource", "Process Path" as "PROCESS PATH", "Process Name" as "PROCESS NAME", COMMAND as "COMMAND", sourceip FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4688 
AND ( "Process Path" ILIKE '%\Temp%' or "Process Path" ILIKE '%\AppData%' or "Process Path" ILIKE '%\$Recycle.Bin%' or "Process Path" ILIKE '%\ProgramData%' or "Process Path" ILIKE '%\System Volume Information%' or "Process Path" ILIKE '%\Windows%' or "Process Path" ILIKE '%\program files%' or "Process Path" ILIKE '%\winsxs%'  ) AND NOT ( "Process Name" ILIKE '%DismHost.exe%' AND "Process Name" ILIKE '%MpCmdRun.exe%' ) )
GROUP BY "Process Path"
LAST 1 DAYS

17. Pass the Ticket - Privilege User

Source : N/A
Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here

Expected False Positive: The tickets might be cahched which might not generate 4768 event ID.

SELECT DATEFORMAT(devicetime,'yyyy-MM-dd hh:mm'),qidEventId,username,"Account Name",sourceip,destinationip,"Hostname",LOGSOURCENAME(logsourceid) FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId=4769 
AND qidEventId!=4768 ) AND username ILIKE 'Administrator' 
LAST 5 DAYS

18. Suspicious Powershell - Commandline

Source : N/A
Author : Abrar Hussain

Parameters Description
Microsoft Security Event Log Add your Microsoft Windows Security logsource_type name here

Expected False Positive: You might see the Microsoft Defender large commandlines with mentioned commandline keywords.

SELECT DATEFORMAT(devicetime,'yyyy-MM-dd hh:mm'), Command ,qidEventId,username,"Account Name",sourceip,destinationip,"Hostname",LOGSOURCENAME(logsourceid) FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Security Event Log%' 
AND "Process Name" ILIKE '%powershell.exe%'
AND ("Command" ILIKE '% -Ex%' OR "Command" ILIKE '%IEX%' OR "Command" ILIKE '%Net.WebClient%' OR "Command" ILIKE '%New-Object  %' OR "Command" ILIKE '% -W%' OR "Command" ILIKE '% h%')) 
GROUP BY command
LAST 2 DAYS

19. Detection CVE_2025_53770 - WAF

Source : https://github.com/Neo23x0/signature-base/blob/master/yara/expl_sharepoint_jul25.yar
Author : Abrar Hussain

Parameters Description
WAF_LogSource Add your WAF logsource_type name here
Expected True Positive: Focused on POST requests

Expected False Positive: Ignore the private IP addresses to access the SignOut.aspx

SELECT DATEFORMAT(devicetime,'yyyy-MM-dd hh:mm'),qideventid AS "Event Name","Target Application","URI","Response Code","Response Status"," HTTP Method","User Agent",sourceip,destinationip,LOGSOURCENAME(logsourceid) FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%WAF_LogSource%' 
AND ("Request_Method" ILIKE '%POST%' OR "RequestMethod" ILIKE '%GET%')
AND ("URI" ILIKE '%15/ToolPane.aspx%' OR "URI" ILIKE '%DisplayMode=Edit&a=/ToolPane.aspx%' OR "URI" ILIKE '%/15/spinstall0.aspx%' OR "URI" ILIKE '%/SignOut.aspx%'  OR "URI" ILIKE '%App_Web_spinstall0.aspx%'  OR "URI" ILIKE '%spinstall0%'))
LAST 1 DAYS 

20.LogSourceTypes EPS - Qradar

Source : https://www.ibm.com/docs/en/qradar-common?topic=cwfads-sample-event-log-source-storage-usage-aql-statements#reference_fsw_c3k_pbb__log_source_summary__title__1
Author : Abrar Hussain

SELECT LOGSOURCETYPENAME(devicetype) AS "LogSourceType",UNIQUECOUNT(logsourceid) as "Number of Log Sources",
COUNT(*)/3600 as "EPS",(DOUBLE(COUNT(isunparsed)) / COUNT(*)) * 100 AS "PercentUnparsed" 
FROM events 
GROUP BY devicetype 
ORDER BY "PercentUnparsed" 
DESC 
LAST 36 HOURS

21.Internal Proxy Configured - Registry Modified - NETSH

Source : https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/

Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here
Object Add Registry Full Path Field here

Investigation Notes: Correlate with EID 1 or 4688 and Look for NETSH.exe events

SELECT LOGSOURCENAME(logsourceid) AS "Logsource", "Process Path" as "PATH", "Process Name" as "NAME", sourceip FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4657 AND ("Object" ILIKE '%PortProxy%' OR "Object" ILIKE '%v4tov4%') )
LAST 1 DAYS

22.Disables remote User Account Control(UAC) - Suspected Defense Evasion

Source : https://unit42.paloaltonetworks.com/unit42-shamoon-2-return-disttrack-wiper/

Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here
Object Add Registry Full Path Field here

Expected True Positive: Registry key value is "1"
Investigation Notes: Correlate with EID 1 or 4688 and Look for reg.exe events

SELECT LOGSOURCENAME(logsourceid) AS "Logsource", "Process Path" as "PATH", "Process Name" as "NAME", sourceip FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4657 AND ("Object" ILIKE '%LocalAccountTokenFilterPolicy%') )
LAST 7 DAYS

23.RDP Hijacking - tscon

Source : https://www.korznikov.com/2017/03/0-day-or-feature-privilege-escalation.html

Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here
Process Path Replace as per your custom field here
Command Replace as per your custom field here
SELECT LOGSOURCENAME(logsourceid) AS "Logsource", "Process Path" as "PATH", "Process Name" as "Process Name","Command", sourceip FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4688
AND "Process Path" ILIKE '%tscon.exe%'
OR ("Command" ILIKE '%noconsentPrompt%' OR "Command" ILIKE '%shadow:%' OR "Command" ILIKE '%tscon%') )
LAST 7 DAYS

24.LOLBIN - CERTUTIL DETECTION

Source : https://lolbas-project.github.io/lolbas/Binaries/Certutil/

Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here
Process Name Replace as per your custom field here
Command Replace as per your custom field here
SELECT LOGSOURCENAME(logsourceid) AS "Logsource", "Process Path" as "PATH", "Process Name" as "Process Name","Command", sourceip FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4688
AND ("Process Name" ILIKE '%certutil.exe%' )
AND ("Command" ILIKE '%urlcache%' OR "Command" ILIKE '%URL%' OR "Command" ILIKE '%verifyctl%' OR "Command" ILIKE '%-exportPFX%' OR "Command" ILIKE '%decode%' ) )
LAST 7 DAYS


25.RDP Authentication from outside - Logon Type 10

Source : https://thedfirreport.com/2025/06/30/hide-your-rdp-password-spray-leads-to-ransomhub-deployment/

Author : Abrar Hussain

Parameters Description
Microsoft Windows Security Event Log Add your Microsoft Windows Security logsource_type name here
SELECT LOGSOURCENAME(logsourceid) AS "Logsource", "Process Path" as "PATH", "Process Name" as "Process Name","Command", sourceip
FROM events 
WHERE (LOGSOURCETYPENAME(devicetype) ILIKE '%Microsoft Windows Security Event Log%' 
AND qidEventId = 4624
AND "Logon Type" ILIKE '%10%'  
AND  NOT (sourceIP BETWEEN '10.0.0.0' AND '10.255.255.255')
AND NOT (sourceIP BETWEEN '172.16.0.0' AND '172.31.255.255')
AND NOT ( sourceIP BETWEEN '192.168.0.0' AND '192.168.255.255') )
LAST 3 DAYS

๐Ÿ›  Usage

  1. Copy the desired AQL query
  2. Paste into QRadar's Ariel Query interface
  3. Adjust time ranges and parameters as needed
  4. Export results for further analysis

About

A collection of powerful AQL (Ariel Query Language) queries for threat hunting, incident investigation, and security monitoring in IBM QRadar.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published