CrowdStrike / FDRLinks
Falcon Data Replicator
☆37Updated last month
Alternatives and similar repositories for FDR
Users that are interested in FDR are comparing it to the libraries listed below
Sorting:
- ☆98Updated 3 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆167Updated this week
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆44Updated last week
- ☆190Updated 2 weeks ago
- Unleash the power of the Falcon Platform at the CLI☆133Updated 2 months ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 2 months ago
- ☆88Updated 9 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆245Updated 8 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Updated 3 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- ☆48Updated 2 months ago
- ☆55Updated 4 years ago
- pocket guide for core detection engineering concepts☆31Updated 2 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆89Updated 4 years ago
- ☆120Updated last month
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆109Updated last year
- Phantom Apps Repo☆82Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 4 years ago
- OCSF Documentation☆145Updated last month
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 9 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- ☆42Updated 5 years ago
- Collection of useful Canary tools☆91Updated 3 weeks ago