CrossRealms / Splunk-Cyences-App-for-SplunkLinks
Cyences App (Cyber Defense) built by CrossRealms International - https://splunkbase.splunk.com/app/5351/
☆11Updated this week
Alternatives and similar repositories for Splunk-Cyences-App-for-Splunk
Users that are interested in Splunk-Cyences-App-for-Splunk are comparing it to the libraries listed below
Sorting:
- Collection of Dashboards for Threat Hunting and more!☆73Updated 5 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Updated last year
- This repository contains Splunk queries to hunt some anomalies☆46Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆41Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 10 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆58Updated 5 years ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- Creating a resource to help build and manage an Insider Threat program.☆101Updated last year
- ☆99Updated 3 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆142Updated last year
- A collection of tips for using MISP.☆75Updated last year
- ☆28Updated 2 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Updated 3 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 2 weeks ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆94Updated 7 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆128Updated 10 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆122Updated 8 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Updated 2 years ago
- Practical Threat Detection Engineering, Published by Packt☆84Updated 2 years ago
- Detection Ideas & Rules repository.☆178Updated 4 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆345Updated this week
- An opensource sigma conversion tool built using pysigma☆157Updated 3 weeks ago
- MISP Playbooks☆222Updated 3 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆189Updated 3 years ago