CrowdStrike / FDRLinks
Falcon Data Replicator
☆31Updated 3 months ago
Alternatives and similar repositories for FDR
Users that are interested in FDR are comparing it to the libraries listed below
Sorting:
- Unleash the power of the Falcon Platform at the CLI☆122Updated last month
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆39Updated this week
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆223Updated 4 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆165Updated 5 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆184Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 9 months ago
- ☆95Updated 2 years ago
- ☆86Updated 5 months ago
- ☆42Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- Phantom Apps Repo☆83Updated 3 years ago
- ☆73Updated 11 months ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- ☆55Updated 4 years ago
- ☆119Updated last year
- Tools to automate and/or expedite response.☆115Updated last year
- Carbon Black API - Python language bindings☆145Updated 11 months ago
- Recon Hunt Queries☆77Updated 4 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- Threat Hunting & Incident Investigation with Osquery☆213Updated 3 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- ☆18Updated 3 years ago
- Cisco Orbital - Osquery queries by Talos☆134Updated 11 months ago
- ☆45Updated 2 years ago
- ☆138Updated 2 weeks ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆83Updated last year
- Cloud security tutorials and best practices☆38Updated 2 years ago
- pocket guide for core detection engineering concepts☆29Updated 2 years ago
- Controls Assessment Specification☆70Updated 4 months ago
- Collection of useful Canary tools☆84Updated last month