CheckPointSW / reputation-service-api
Leverage the Check Point’s threat intelligence to enrich your SIEM and SOAR solutions and to secure your business applications and websites by using simple RESTful APIs.
☆27Updated last year
Alternatives and similar repositories for reputation-service-api:
Users that are interested in reputation-service-api are comparing it to the libraries listed below
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- Palo Alto Networks App for Splunk leverages the data visibility provided by Palo Alto Networks next-generation firewalls and endpoint sec…☆106Updated 4 months ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 2 weeks ago
- WebUI of MineMeld☆43Updated last year
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated last year
- Pep up your Windows Event Collector (WEC) for Windows Event Forwarding (WEF)☆19Updated 3 years ago
- This Ansible collection provides control over a Check Point Management server using Check Point's web-services APIs.☆40Updated this week
- Terraform provider for Check Point☆28Updated last week
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago
- An extension can use JavaScript to interact with SmartConsole. The interactions provide access to information, such as the extension loca…☆22Updated 7 months ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 6 months ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 3 years ago
- Alert notification plugin for Graylog to generate log messages from alerts☆24Updated last month
- Phantom Apps Repo☆82Updated 3 years ago
- Generate syslog messages to test logging solutions.☆54Updated 11 months ago
- ☆48Updated this week
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 months ago
- Converts Netwitness log parser configuration to Logstash configuration☆20Updated 4 years ago
- Install a full Splunk Enterprise Cluster or Universal forwarder using an ansible playbook☆52Updated 4 years ago
- Engine of MineMeld☆141Updated 2 years ago
- Suricata Verification Tests - Testing Suricata Output☆104Updated this week
- Sample programs to access the API☆76Updated last week
- DevSec Windows Patch Baseline - InSpec Profile☆47Updated 6 months ago
- ☆22Updated 4 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆19Updated 11 months ago