CrowdStrike / FDR
Falcon Data Replicator
☆31Updated last month
Alternatives and similar repositories for FDR
Users that are interested in FDR are comparing it to the libraries listed below
Sorting:
- Unleash the power of the Falcon Platform at the CLI☆117Updated last week
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆38Updated last week
- Recon Hunt Queries☆77Updated 3 years ago
- Collection of useful Canary tools☆78Updated 3 weeks ago
- ☆94Updated 2 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 2 months ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆211Updated last month
- ☆54Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Salt States for Configuring the SIFT Workstation☆102Updated this week
- This is a repository for freq.py and freq_server.py☆206Updated 4 years ago
- 2021 SANS DFIR Summit: Greppin' Logs☆20Updated 3 years ago
- ☆42Updated 4 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- ☆26Updated 3 years ago
- misp-cloud - Cloud-ready images of MISP☆72Updated 2 years ago
- ☆33Updated 6 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Tools to automate and/or expedite response.☆114Updated 10 months ago
- ☆18Updated 3 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- The FASTEST way to consume threat intel.☆68Updated 2 years ago
- Phantom Apps Repo☆82Updated 3 years ago
- ☆43Updated 2 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago