CrowdStrike / FDRLinks
Falcon Data Replicator
☆31Updated 2 months ago
Alternatives and similar repositories for FDR
Users that are interested in FDR are comparing it to the libraries listed below
Sorting:
- Unleash the power of the Falcon Platform at the CLI☆119Updated this week
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆38Updated last week
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- ☆54Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Discover for Cloud and Containers Azure☆29Updated 4 months ago
- Recon Hunt Queries☆77Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Tools to automate and/or expedite response.☆115Updated 11 months ago
- ☆85Updated 3 months ago
- ☆45Updated 2 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- 2021 SANS DFIR Summit: Greppin' Logs☆20Updated 3 years ago
- Salt States for Configuring the SIFT Workstation☆104Updated this week
- ☆42Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 8 months ago
- ☆46Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆40Updated 2 months ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 3 months ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆82Updated last month
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Search a filesystem for indicators of compromise (IoC).☆74Updated last week
- Public REPO for splunkbase app☆19Updated 3 years ago
- ☆95Updated 2 years ago