Skip to content

A userscript that enhances the SentinelOne PowerQuery interface with a custom threat hunting button that follow the website UI / UX design interface.

Notifications You must be signed in to change notification settings

LasCC/SentinelOne-Userscript

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

SentinelOne PowerQuery Custom Menu - Userscript

A userscript that enhances the SentinelOne PowerQuery interface with a custom threat hunting button that follow the website UI / UX design interface.

Demo Overview

Features

  • Custom Hunting Queries Menu: Access a curated collection of threat hunting queries organized by category
  • Query Pinning: Pin frequently used queries for quick access
  • Search & Filter: Search through queries by name or description
  • Cell Copy Buttons: One-click copy functionality for each query result cell
  • Compact UI: Clean, organized interface that integrates seamlessly with SentinelOne

Demo Overview

Installation

  1. Install a userscript manager like Tampermonkey or Greasemonkey
  2. Click here to install the script
  3. The script will automatically load when you visit SentinelOne PowerQuery pages

After the first installation there will be a Tampermonkey popup asking to allow the fetch to grab all the detection rules. You need to click the button "Always allow domain".

Demo Overview

Default Rules

By default, the script comes with a comprehensive set of pre-configured threat hunting rules covering various categories such as:

  • Installation & Persistence
  • Process Execution
  • Network Activity
  • Registry Modifications
  • File System Activity
  • And more...

Customizing the Rules Source

You can modify the script to use your own custom rules by changing the QUERIES_URL constant. Here's how:

- const QUERIES_URL = "https://raw.githubusercontent.com/LasCC/SentinelOne-Userscript/refs/heads/master/s1_powerquery_hunting.json";
+ const QUERIES_URL = "https://your-domain.com/path/to/your/custom-rules.json";

Rules Format

The JSON file should contain an array of rule objects with the following structure:

[
    {
        "category": "Installation & Persistence",
        "name": "EpiBrowser and OneStart installation",
        "query": "your rule (json encoded)"
    },
]

Required Fields

  • category: The category name for organizing queries (e.g., "Network Activity", "Process Execution")
  • name: Display name for the query
  • query: The actual detection query

Usage

  1. Navigate to any SentinelOne PowerQuery page (*.sentinelone.net/query*)
  2. Look for the "Hunting Queries" button in the toolbar
  3. Click to open the dropdown menu with all available queries
  4. Use the search bar to find specific queries
  5. Filter by category using the tabs
  6. Click on any query to execute it immediately
  7. Use the star icon to pin/unpin frequently used queries

Browser Compatibility

  • Chrome/Chromium-based browsers with Tampermonkey
  • Firefox with Greasemonkey or Tampermonkey

Contributing

Feel free to contribute additional hunting queries, bug fixes, or feature improvements by submitting pull requests to the GitHub repository.

About

A userscript that enhances the SentinelOne PowerQuery interface with a custom threat hunting button that follow the website UI / UX design interface.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published