CiscoSecurity / fp-05-firepower-cef-connector-arcsightView external linksLinks
Cisco eStreamer client
☆24Aug 15, 2022Updated 3 years ago
Alternatives and similar repositories for fp-05-firepower-cef-connector-arcsight
Users that are interested in fp-05-firepower-cef-connector-arcsight are comparing it to the libraries listed below
Sorting:
- Cisco Secure Firewall Threat Defense Virtual | Autoscale | Cluster | More . . .☆22Updated this week
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- a library of Logstash pipeline configuration files mapping data to the Elastic Common Schema☆10Feb 28, 2021Updated 4 years ago
- WebUI of MineMeld☆43Mar 16, 2023Updated 2 years ago
- The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the…☆11Jan 8, 2020Updated 6 years ago
- SaltStack Docker images☆12Dec 27, 2018Updated 7 years ago
- Collect SIEM logs from the Mimecast API using Python. Currently supports multiple endpoints. Use this to be able to easily and quickly fo…☆11Apr 4, 2024Updated last year
- C2S for Red Hat Enterprise Linux 7 - Ansible role generated from ComplianceAsCode Project☆10Nov 30, 2023Updated 2 years ago
- simulate slow network connections on *nix☆10Feb 29, 2012Updated 13 years ago
- sysvinit booting scripts replacement for Pardus☆21Dec 1, 2011Updated 14 years ago
- Golang script to bypass the client-side health checks when logging into DUO protected accounts☆11Aug 26, 2023Updated 2 years ago
- Packer.io Scripts to build the SIFT VM(s)☆10Aug 29, 2020Updated 5 years ago
- A high-level HTTP / REST client for Node☆29Oct 2, 2020Updated 5 years ago
- Resource (icon) extraction tools☆12Apr 22, 2024Updated last year
- Sample plugin for Graylog 2.0 including web ui parts.☆10Feb 7, 2024Updated 2 years ago
- A simple example on how to initiate a direct syscall on WoW64☆12Feb 2, 2018Updated 8 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 2 months ago
- ☆10Feb 22, 2018Updated 7 years ago
- A yt-dlp-plugin that uses Apple's WebKit framework to solve Youtube N/Sig☆30Nov 12, 2025Updated 3 months ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Convert an IOS/NXOS/ACE/ASA config file into basic HTML, creating links between commands referencing lists and that list (e.g. access lis…☆14May 23, 2018Updated 7 years ago
- Splunk Custom Visualization☆13May 25, 2018Updated 7 years ago
- A tool for studying JavaScript malware.☆15Feb 9, 2026Updated last week
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆14Feb 1, 2021Updated 5 years ago
- Logstash Input Plugin for Cloudflare logs☆14Dec 31, 2019Updated 6 years ago
- Automates The Setup of Exchange Accounts☆14Nov 10, 2015Updated 10 years ago
- Script that starts AM MegaRAC Remote Console Viewer☆15Jan 7, 2023Updated 3 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 2 months ago
- Repository for SPEED SIEM Use Case Framework☆59May 2, 2020Updated 5 years ago
- ☆12Jun 20, 2018Updated 7 years ago
- Python scripts for using mindmup JSON as a medium for developing attack trees☆15Aug 25, 2021Updated 4 years ago
- ☆17Sep 9, 2020Updated 5 years ago
- Scripts that cover the basics of interacting with the AMP for Endpoints API☆17Feb 22, 2019Updated 6 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- zalora nix expressions library☆18Nov 8, 2015Updated 10 years ago
- Python Module for creating Log Event Extended Format events for IBM QRadar☆12Jun 4, 2016Updated 9 years ago
- Iterate over Windows Handles☆15Nov 18, 2025Updated 2 months ago
- ☆19May 30, 2022Updated 3 years ago