01Access pre-defined hunting scenarios for common threats like LSASS dumping and C2 beaconing
023 GitHub stars
03Analyze process, network, file, and registry telemetry for indicators of compromise
04Generate optimized query syntax from natural language using Purple AI integration
05Manage precise time ranges with ISO-to-Unix epoch timestamp conversion
06Execute complex PowerQuery searches against the Singularity Data Lake