13 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (258:270, 4%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1150:1162, 1%) 13 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (258:270, 4%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1797:1809, <1%) 13 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (258:270, 4%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (807:819, 1%) 13 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (258:270, 4%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1654:1666, <1%) 13 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (258:270, 4%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1705:1717, <1%) 13 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (258:270, 4%) - tutorials-and-examples/feature-tutorials/ResourceGraphDriver.ipynb (725:737, 1%) 13 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (258:270, 4%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (478:490, 2%) 13 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (258:270, 4%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (211:223, 4%) 11 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (260:270, 3%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (394:404, 2%) 11 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (260:270, 3%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (2072:2082, <1%) 11 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (260:270, 3%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (832:842, 1%) 11 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (260:270, 3%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (172:182, 4%) 11 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (260:270, 3%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (166:176, 6%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1638:1645, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (182:189, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (165:172, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (75:82, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (47:54, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (15:22, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1638:1645, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (33:40, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (58:65, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (68:75, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (78:85, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (91:98, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (75:82, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (47:54, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (15:22, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (137:144, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (101:108, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1638:1645, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (42:49, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (14:21, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (101:108, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (137:144, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (24:31, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (78:85, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (91:98, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (58:65, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (68:75, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (24:31, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (42:49, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (14:21, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1638:1645, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (137:144, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (101:108, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1638:1645, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (281:288, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (322:329, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (340:347, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (309:316, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (472:479, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (430:437, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (102:109, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (531:538, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (513:520, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (500:507, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (607:614, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (24:31, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (15:22, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (47:54, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (75:82, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (58:65, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (91:98, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (78:85, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (68:75, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (137:144, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (101:108, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (14:21, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (42:49, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (340:347, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (322:329, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (309:316, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (472:479, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (430:437, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (531:538, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (513:520, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (500:507, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (607:614, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (102:109, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (281:288, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (137:144, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (101:108, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (165:172, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (182:189, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (78:85, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (58:65, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (68:75, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (91:98, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (75:82, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (15:22, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (47:54, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (75:82, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (15:22, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (47:54, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (33:40, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (24:31, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (165:172, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (182:189, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1638:1645, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (607:614, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (15:22, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (47:54, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (75:82, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (500:507, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (531:538, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (513:520, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (430:437, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (472:479, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (340:347, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (322:329, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (309:316, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (281:288, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (102:109, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (42:49, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (14:21, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (75:82, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (15:22, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (47:54, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (101:108, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (137:144, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (33:40, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (24:31, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (182:189, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (165:172, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (91:98, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (58:65, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (68:75, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (78:85, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (58:65, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (91:98, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (68:75, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (78:85, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (42:49, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (14:21, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (58:65, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (68:75, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (78:85, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (91:98, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (33:40, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (24:31, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (165:172, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (182:189, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1638:1645, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (182:189, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (165:172, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (33:40, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (24:31, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1638:1645, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (182:189, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (165:172, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (47:54, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (75:82, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (15:22, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (101:108, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (137:144, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (24:31, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (14:21, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (42:49, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (33:40, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (33:40, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (24:31, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (58:65, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (78:85, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (68:75, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (91:98, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (165:172, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (182:189, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (91:98, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (58:65, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (78:85, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (68:75, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (14:21, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (42:49, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (75:82, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (15:22, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (47:54, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (102:109, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (281:288, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (309:316, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (322:329, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (607:614, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (340:347, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (430:437, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (472:479, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (500:507, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (513:520, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (531:538, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (42:49, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (14:21, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (322:329, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (309:316, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (340:347, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (430:437, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (472:479, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (102:109, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (281:288, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (531:538, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (513:520, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (500:507, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (607:614, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (101:108, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (137:144, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (101:108, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:94, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (137:144, 4%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (165:172, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (182:189, 2%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:136, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (33:40, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (14:21, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (42:49, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (281:288, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (102:109, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (430:437, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (472:479, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (500:507, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (513:520, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (309:316, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (322:329, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (340:347, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (531:538, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (607:614, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (607:614, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (531:538, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (513:520, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (500:507, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (472:479, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (430:437, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (340:347, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (322:329, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (309:316, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (281:288, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1638:1645, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (102:109, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (513:520, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (500:507, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (531:538, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (472:479, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (430:437, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:189, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (33:40, 3%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (340:347, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (607:614, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (309:316, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (322:329, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (281:288, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (102:109, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (102:109, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (340:347, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (322:329, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (309:316, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (281:288, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (531:538, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (500:507, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (513:520, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (607:614, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (472:479, <1%) 8 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (430:437, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (192:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (337:343, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (192:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (685:691, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:214, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (794:800, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:188, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (794:800, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (155:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (455:461, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (155:161, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (259:265, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (209:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (259:265, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (209:215, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (455:461, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (209:215, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (27:33, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:241, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (136:142, 3%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:110, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (136:142, 3%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (221:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (259:265, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (221:227, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (455:461, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:135, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (794:800, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (236:242, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (27:33, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (72:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (455:461, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (105:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (259:265, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (72:78, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (259:265, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (236:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (455:461, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (236:242, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (259:265, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:226, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (794:800, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:160, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1783:1789, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:214, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1783:1789, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (105:111, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (455:461, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:226, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1783:1789, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (208:214, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (136:142, 3%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:110, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1783:1789, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:77, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1783:1789, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:241, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1783:1789, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:188, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (136:142, 3%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:135, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (136:142, 3%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (72:78, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (27:33, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (155:161, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (27:33, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (183:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (455:461, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (183:189, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (259:265, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (183:189, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (27:33, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (88:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (259:265, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (88:94, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (455:461, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (104:110, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (794:800, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:77, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (136:142, 3%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:93, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (136:142, 3%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (130:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (455:461, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (182:188, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1783:1789, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (130:136, 2%) - tutorials-and-examples/how-tos/Azure Sentinel Query Creator.ipynb (259:265, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (221:227, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (27:33, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (105:111, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (27:33, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (235:241, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (794:800, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:93, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (794:800, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (71:77, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (794:800, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (87:93, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1783:1789, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (130:136, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (27:33, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (129:135, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1783:1789, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (220:226, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (136:142, 3%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (88:94, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (27:33, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:160, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (136:142, 3%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (154:160, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (794:800, <1%) 7 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (192:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1033:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (16:21, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (57:62, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (23:28, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (153:158, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (209:214, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (268:273, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (338:343, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (300:305, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1:6, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (686:691, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (879:884, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (119:124, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1319:1324, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1132:1137, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1742:1747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (193:198, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (155:160, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (118:123, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (210:215, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (121:126, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (114:119, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (169:174, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (102:107, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (86:91, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (51:56, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (8:13, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (8:13, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (436:441, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (380:385, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (407:412, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (260:265, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (226:231, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (150:155, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (8:13, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (84:89, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (28:33, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (8:13, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (70:75, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (40:45, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (84:89, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (28:33, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1742:1747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (114:119, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (121:126, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1319:1324, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (209:214, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (157:162, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (73:78, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (3:8, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (131:136, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (3:8, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (879:884, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (16:21, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (210:215, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (102:107, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (169:174, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1132:1137, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (342:347, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1132:1137, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (180:185, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (130:135, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (283:288, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (231:236, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (44:49, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (48:53, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (31:36, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (44:49, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (86:91, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (48:53, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (31:36, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (364:369, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (44:49, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (756:761, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (283:288, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (342:347, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (130:135, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (180:185, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (231:236, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (44:49, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (183:188, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (157:162, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1302:1307, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (51:56, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1375:1380, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (530:535, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1402:1407, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (553:558, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (222:227, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1113:1118, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (140:145, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (33:38, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (808:813, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (931:936, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (222:227, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (140:145, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (879:884, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1247:1252, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1132:1137, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (756:761, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (28:33, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (84:89, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1547:1552, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (364:369, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1757:1762, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (118:123, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (8:13, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (193:198, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (155:160, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (118:123, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (193:198, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (155:160, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1:6, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (70:75, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (40:45, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (86:91, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (1:6, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (44:49, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (51:56, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (808:813, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (931:936, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (530:535, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (553:558, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1:6, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1113:1118, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (155:160, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (118:123, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (193:198, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (44:49, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1302:1307, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1375:1380, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1402:1407, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1742:1747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1302:1307, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1402:1407, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1375:1380, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1319:1324, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (150:155, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (226:231, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (260:265, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (380:385, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (40:45, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (70:75, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (436:441, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (407:412, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (931:936, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (530:535, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (553:558, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (808:813, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1120:1125, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1424:1429, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1493:1498, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1466:1471, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1500:1505, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1589:1594, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1256:1261, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1383:1388, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1630:1635, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (805:810, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (33:38, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (51:56, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1547:1552, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (40:45, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (70:75, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1757:1762, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1113:1118, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1247:1252, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (356:361, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (314:319, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1757:1762, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (129:134, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (742:747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1247:1252, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (629:634, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (688:693, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (504:509, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (545:550, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1547:1552, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (140:145, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (289:294, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (218:223, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (222:227, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (374:379, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (315:320, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (484:489, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (531:536, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (222:227, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (530:535, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (553:558, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (545:550, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (504:509, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (808:813, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (688:693, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (629:634, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (742:747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (931:936, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (805:810, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (129:134, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (8:13, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (356:361, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (314:319, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (756:761, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (140:145, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (140:145, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (222:227, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (8:13, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (553:558, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (530:535, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (931:936, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (808:813, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1402:1407, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1302:1307, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1375:1380, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (364:369, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (44:49, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (686:691, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (153:158, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (209:214, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (268:273, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (300:305, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (338:343, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (119:124, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (231:236, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (283:288, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (342:347, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (51:56, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (180:185, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (130:135, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1547:1552, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1757:1762, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1113:1118, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1247:1252, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (931:936, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1630:1635, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1424:1429, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1493:1498, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1466:1471, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (879:884, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (808:813, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1589:1594, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1500:1505, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (231:236, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (283:288, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1256:1261, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (130:135, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (180:185, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1383:1388, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (879:884, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (342:347, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1120:1125, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (140:145, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (222:227, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (48:53, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (31:36, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (530:535, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (553:558, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (364:369, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (374:379, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (484:489, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (531:536, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (218:223, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (289:294, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (315:320, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (86:91, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (756:761, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (140:145, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (222:227, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (805:810, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (114:119, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (121:126, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (57:62, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (23:28, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (742:747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (629:634, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (688:693, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (504:509, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (545:550, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (356:361, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (106:111, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (3:8, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (129:134, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (504:509, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (545:550, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (314:319, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (356:361, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (805:810, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (314:319, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (129:134, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (808:813, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (629:634, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (688:693, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (931:936, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (742:747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (553:558, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (530:535, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (33:38, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (44:49, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (756:761, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (364:369, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1402:1407, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1302:1307, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1375:1380, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (23:28, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (57:62, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (686:691, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (268:273, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (338:343, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (300:305, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (153:158, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (119:124, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (209:214, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (805:810, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (40:45, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (70:75, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (130:135, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (157:162, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (129:134, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (356:361, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (314:319, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (504:509, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (545:550, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (629:634, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (688:693, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (742:747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (129:134, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (314:319, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (356:361, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (504:509, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (545:550, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (629:634, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (688:693, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (805:810, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (742:747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1113:1118, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1247:1252, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (222:227, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (3:8, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (118:123, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (193:198, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (155:160, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (686:691, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (209:214, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (268:273, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (338:343, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (300:305, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (218:223, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (289:294, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (315:320, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (374:379, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (121:126, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (114:119, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (484:489, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (531:536, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1132:1137, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (119:124, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (153:158, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1547:1552, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1757:1762, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (545:550, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (504:509, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (289:294, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (218:223, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (688:693, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (629:634, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (742:747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (805:810, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (531:536, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (129:134, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (374:379, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (315:320, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (356:361, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (314:319, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (484:489, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (86:91, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (8:13, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1383:1388, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1493:1498, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1466:1471, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1424:1429, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (118:123, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (155:160, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1120:1125, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1256:1261, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (193:198, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (140:145, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (222:227, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (16:21, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (530:535, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (553:558, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (808:813, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (931:936, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (553:558, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (530:535, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (931:936, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (808:813, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (88:93, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (157:162, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (222:227, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (140:145, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (72:77, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (157:162, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (237:242, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (3:8, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (51:56, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (40:45, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (70:75, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1589:1594, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1500:1505, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1630:1635, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (44:49, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (57:62, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (23:28, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (16:21, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (210:215, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (3:8, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (28:33, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (84:89, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1319:1324, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1742:1747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (40:45, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (70:75, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (879:884, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (114:119, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (121:126, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (531:536, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (289:294, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (218:223, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (484:489, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (8:13, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (374:379, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (315:320, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1319:1324, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (805:810, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (629:634, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (688:693, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (742:747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1742:1747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (504:509, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (545:550, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1319:1324, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (314:319, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (356:361, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (129:134, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1742:1747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (184:189, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (3:8, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (436:441, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (407:412, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (380:385, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (226:231, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (16:21, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (150:155, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (260:265, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (16:21, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1383:1388, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1424:1429, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1493:1498, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1466:1471, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1500:1505, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1589:1594, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1630:1635, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1120:1125, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1256:1261, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (283:288, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (231:236, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (180:185, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (70:75, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (40:45, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (342:347, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (130:135, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (8:13, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (44:49, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (86:91, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (16:21, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (118:123, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (155:160, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (193:198, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (300:305, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (268:273, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (209:214, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (153:158, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (119:124, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (338:343, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (300:305, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (209:214, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (268:273, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (119:124, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (153:158, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (688:693, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (629:634, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (545:550, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (504:509, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (314:319, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (356:361, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (129:134, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (28:33, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (84:89, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (33:38, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (686:691, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (805:810, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (742:747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (221:226, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (157:162, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1589:1594, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1500:1505, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1630:1635, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (364:369, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1383:1388, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1493:1498, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1466:1471, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1424:1429, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1120:1125, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1256:1261, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (756:761, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (44:49, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (121:126, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (114:119, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (1:6, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (686:691, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (44:49, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (44:49, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (84:89, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (28:33, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (86:91, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (119:124, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (153:158, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (209:214, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (268:273, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (300:305, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (338:343, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (8:13, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (300:305, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (338:343, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (268:273, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (686:691, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (119:124, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1319:1324, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (209:214, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (153:158, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1742:1747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1132:1137, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (156:161, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (3:8, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1402:1407, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1302:1307, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1375:1380, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (28:33, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (84:89, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (226:231, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (260:265, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (150:155, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (28:33, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (84:89, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (407:412, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (436:441, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (380:385, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (277:282, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1725:1730, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (180:185, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (130:135, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (283:288, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (231:236, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (342:347, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1113:1118, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (8:13, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1247:1252, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1547:1552, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (8:13, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1757:1762, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1500:1505, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1589:1594, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1630:1635, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1383:1388, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1424:1429, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1493:1498, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1466:1471, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1120:1125, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (33:38, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1256:1261, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (48:53, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (31:36, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (155:160, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (157:162, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1:6, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1132:1137, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1120:1125, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1256:1261, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1383:1388, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1466:1471, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1424:1429, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1493:1498, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1589:1594, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1500:1505, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1630:1635, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (342:347, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (231:236, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (283:288, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (180:185, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (130:135, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (16:21, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (531:536, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (484:489, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (374:379, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (315:320, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (289:294, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (218:223, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1742:1747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1319:1324, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (114:119, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (121:126, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (289:294, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (218:223, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (484:489, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (260:265, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (226:231, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (374:379, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (315:320, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (380:385, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (86:91, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (531:536, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (364:369, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (150:155, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (8:13, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (436:441, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (407:412, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (28:33, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MordorData.ipynb (84:89, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1375:1380, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1302:1307, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1402:1407, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (33:38, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (44:49, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (756:761, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (118:123, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (155:160, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (193:198, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (48:53, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (31:36, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (1:6, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1547:1552, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1132:1137, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (23:28, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (57:62, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1757:1762, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1113:1118, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1247:1252, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (8:13, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (33:38, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (51:56, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (31:36, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (48:53, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1500:1505, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1589:1594, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1424:1429, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1466:1471, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1493:1498, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1383:1388, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1256:1261, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1630:1635, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1120:1125, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (86:91, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (150:155, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (260:265, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (226:231, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (380:385, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (436:441, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (407:412, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (210:215, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (102:107, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (169:174, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1302:1307, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1375:1380, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1402:1407, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (315:320, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (374:379, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (484:489, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (531:536, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1402:1407, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1375:1380, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (1302:1307, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (289:294, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (218:223, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (48:53, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (31:36, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1247:1252, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (879:884, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1113:1118, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1757:1762, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1547:1552, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (44:49, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (121:126, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (114:119, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (23:28, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (57:62, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (169:174, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (102:107, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (210:215, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (70:75, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (40:45, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (1132:1137, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (23:28, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (57:62, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (51:56, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (8:13, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (57:62, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (23:28, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1742:1747, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1757:1762, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1034:1039, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1547:1552, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (260:265, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (380:385, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (436:441, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (407:412, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (119:124, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (153:158, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (114:119, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (121:126, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (1319:1324, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (150:155, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (226:231, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (300:305, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (338:343, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (209:214, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (268:273, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1247:1252, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (686:691, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (1113:1118, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (169:174, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (102:107, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (210:215, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (364:369, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (169:174, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (102:107, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (756:761, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (756:761, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (364:369, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (80:85, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (210:215, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/example-notebooks/Example - Azure Storage VT Hash Lookup.ipynb (1:6, 3%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (484:489, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (289:294, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (374:379, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (315:320, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (531:536, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (89:94, 2%) - tutorials-and-examples/example-notebooks/M365 Defender - APIs ep3.ipynb (3:8, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (218:223, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (236:241, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (157:162, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (57:62, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (23:28, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (48:53, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (31:36, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (105:110, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (157:162, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (33:38, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1500:1505, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1589:1594, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1630:1635, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1120:1125, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1256:1261, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1383:1388, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1493:1498, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1466:1471, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (120:125, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (1424:1429, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (102:107, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (169:174, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (210:215, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (260:265, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (44:49, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (226:231, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (380:385, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (169:174, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (102:107, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (150:155, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (210:215, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (407:412, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (436:441, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (113:118, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (879:884, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/how-tos/Provisioning DSVM.ipynb (33:38, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (193:198, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (155:160, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (118:123, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/feature-tutorials/DataUploader.ipynb (1:6, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (1:6, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (1:6, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/DataObfuscation.ipynb (879:884, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (44:49, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (22:27, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (342:347, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (130:135, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (180:185, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (231:236, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (283:288, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (8:13, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (31:36, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (97:102, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (48:53, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/IoCExtract.ipynb (16:21, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (22:27, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (193:198, 2%) - tutorials-and-examples/feature-tutorials/Splunk-DataConnector.ipynb (44:49, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (102:107, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (169:174, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/MDATPQuery.ipynb (210:215, <1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (51:56, 2%) - tutorials-and-examples/feature-tutorials/Sumologic-DataConnector.ipynb (8:13, 2%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (342:347, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (180:185, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (130:135, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (283:288, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (64:69, 2%) - tutorials-and-examples/feature-tutorials/SqlToKql.ipynb (231:236, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (226:231, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (260:265, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (380:385, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (436:441, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (407:412, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (143:148, 2%) - tutorials-and-examples/feature-tutorials/AzureBlobStorage.ipynb (150:155, 1%) 6 duplicated lines in: - mitremap-notebook/MitreMap - Infer MITRE technique from Threat Intel Data.ipynb (165:170, 2%) - tutorials-and-examples/feature-tutorials/AzureSentinelAPIs.ipynb (51:56, <1%)