Skip to content

KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries by extracting IOCs from URLs or raw text.

License

Notifications You must be signed in to change notification settings

Var5h1l/KQLIntel

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

KQLIntel 🚀

From Unstructured Threat Intel to Actionable KQL Queries in Seconds

GitHub language count GitHub top language GitHub


KQLIntel is a powerful, browser-based tool designed to bridge the gap between unstructured threat intelligence reports and actionable Kusto Query Language (KQL) queries. It leverages the power of modern Large Language Models (LLMs) to analyze threat reports from URLs or raw text, intelligently extract Indicators of Compromise (IOCs), and automatically generate KQL queries ready for threat hunting in Microsoft Sentinel and other security platforms.

The tool is designed for security analysts, threat hunters, and incident responders who need to quickly operationalize threat intelligence without manual parsing and query creation.

✨ Key Features

  • Intelligent IOC Extraction: Automatically identifies and extracts key IOCs, including IPs, domains, file hashes (MD5, SHA1, SHA256), filenames, and URLs.
  • Automatic KQL Generation: Instantly generates "guaranteed" KQL queries based on the extracted IOCs, ready to be used in your security tools.
  • AI-Powered Enhancements:
    • Threat Summaries: Get a concise, AI-generated summary of the threat report.
    • Advanced Hunting Queries: Discover deeper threats with experimental, AI-suggested hunting queries.
    • Mitigation Suggestions: Receive actionable mitigation steps to respond to the identified threats.
  • Flexible Input: Analyze intelligence by providing a URL to a public report or by pasting in raw, unstructured text.
  • Multi-Provider LLM Support: Integrates with a wide range of LLM providers, including Google Gemini, OpenAI, Azure OpenAI, Anthropic, and any provider compatible with the OpenRouter API.
  • Modern UI: Features a sleek, user-friendly interface with both dark and light modes to suit your preference.
  • Secure by Design: API keys are stored securely in your browser's local storage and are never exposed or transmitted anywhere except to the respective AI provider's endpoint.

🚀 Live Demo & Screenshots

1. URL / Threat Report Page

image

2. KQL Queries

image

3. AI Generated Recommendations

image

4. API Configurations

image

🛠️ Getting Started

KQLIntel is a pure client-side application and requires no backend. You can run it locally or host it on any static web hosting service like GitHub Pages, Vercel, or Netlify.

Prerequisites

  • A modern web browser (Chrome, Firefox, Edge, Safari).
  • An API key from a supported LLM provider (e.g., Azure OpenAI OR Google AI Studio), etc.

Installation

  1. Clone the repository:
    git clone [https://github.com/Var5h1l/KQLIntel.git](https://github.com/Var5h1l/KQLIntel.git)
  2. Navigate to the directory:
    cd KQLIntel
  3. Open index.html: Simply open the index.html file in your local web browser to start using the application.

⚙️ How to Use

  1. Set Your API Keys:

    • On first launch, click the "Set API Keys" button in the top-right corner.
    • Enter the API key for the AI provider you wish to use.
    • Click "Save". Your key is saved securely in your browser's local storage for future use.
  2. Choose an Input Method:

    • URL: Paste the URL of a public threat intelligence report. The tool will fetch and parse the content.
    • Raw Text: Paste any unstructured text containing threat intelligence or IOCs directly into the text area.
  3. Analyze the Intel:

    • Select your preferred AI Provider and Model from the dropdown menus.
    • Click the "Analyze & Generate KQL" button.
  4. Review the Results:

    • Guaranteed KQL Queries: The application will immediately display KQL queries based on the IOCs it confidently extracted.
    • AI Threat Summary: Click "Generate Summary" to get a high-level overview of the threat.
    • AI-Assisted Hunting Queries: Click "Suggest Advanced Queries" for more complex, behavior-based KQL queries.
    • Mitigation Suggestions: After generating a summary, click "Suggest Mitigations" for recommended response actions.

🤝 Contributing & Future Enhancement Roadmap

Contributions, issues, and feature requests are welcome! Please feel free to check the issues page to see if your idea has already been discussed.

KQLIntel is actively evolving! Planned enhancements include:

  • KQL Query Enhancer & Optimizer:
    Improve generated KQL queries for performance, best practices, and reduced resource consumption.

  • Multiple URL Report Support:
    Enable users to analyze and generate KQL from several threat intelligence report URLs simultaneously.

  • API-Free Report Generation:
    Allow users to generate basic reports and queries without requiring an API key, making the tool more accessible.

  • Integration of New AI Models:
    Expand compatibility by adding support for additional AI models and providers, enhancing flexibility and accuracy.


👤 Author

📄 License

This project is open-source and available under the MIT License. See the LICENSE file for more info.

About

KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries by extracting IOCs from URLs or raw text.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published