CrowdStrike / FDRLinks
Falcon Data Replicator
☆31Updated last month
Alternatives and similar repositories for FDR
Users that are interested in FDR are comparing it to the libraries listed below
Sorting:
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆38Updated last week
- Unleash the power of the Falcon Platform at the CLI☆119Updated this week
- ☆95Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Collection of useful Canary tools☆79Updated 2 weeks ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Tools to automate and/or expedite response.☆115Updated 10 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- Phantom Apps Repo☆83Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆73Updated last week
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- ☆54Updated 3 years ago
- Recon Hunt Queries☆77Updated 4 years ago
- VMware Carbon Black Cloud Python SDK☆44Updated 2 months ago
- ☆33Updated 7 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- WebUI of MineMeld☆43Updated 2 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- ☆18Updated 3 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆40Updated 2 months ago
- ☆46Updated last year
- ☆72Updated 9 months ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Report Generation from the Carbon Black REST API☆15Updated 3 years ago