CiscoSecurity / wikiLinks
Wiki for general information about repositories
☆23Updated 7 years ago
Alternatives and similar repositories for wiki
Users that are interested in wiki are comparing it to the libraries listed below
Sorting:
- Subscribe to raw VMware Carbon Black EDR event feed and forward to another system, such as Splunk.☆73Updated last year
- Alienvault OTX Bro IDS Connector☆78Updated 10 years ago
- Engine of MineMeld☆141Updated 2 years ago
- Palo Alto Networks App for Splunk leverages the data visibility provided by Palo Alto Networks next-generation firewalls and endpoint sec…☆108Updated last year
- WALKOFF-enabled applications. #nsacyber☆143Updated 6 years ago
- ☆36Updated 5 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆55Updated 2 weeks ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago
- Best practices in threat intelligence☆50Updated 3 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 5 years ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆102Updated 6 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 6 years ago
- MineMeld nodes for MISP☆19Updated 2 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
- WebUI of MineMeld☆43Updated 2 years ago
- Community driven repository of Playbooks and Apps for ThreatConnect.☆74Updated 3 months ago
- Prototypes for MineMeld nodes☆39Updated 4 years ago
- Documentation and Tools for Cisco's PSIRT openVuln API☆116Updated 9 months ago
- Sandia Cyber Omni Tracker (SCOT)☆253Updated last year
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11Updated 2 years ago
- Cyber Threat Intelligence Feeds☆70Updated last year
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- Snort FAQ☆118Updated 4 years ago
- Tools to assist in forensicating docker☆86Updated 11 months ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Updated 4 years ago
- Alienvault OTX TAXII connector☆56Updated 8 years ago
- Logs key Windows process performance metrics. #nsacyber☆69Updated 3 years ago
- Palo Alto Networks Rule Parser☆16Updated 9 years ago