CrowdStrike / FDRLinks
Falcon Data Replicator
☆36Updated last month
Alternatives and similar repositories for FDR
Users that are interested in FDR are comparing it to the libraries listed below
Sorting:
- Unleash the power of the Falcon Platform at the CLI☆133Updated 2 months ago
- ☆189Updated 2 weeks ago
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆44Updated last week
- ☆98Updated 3 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆166Updated last week
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆245Updated 8 months ago
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Updated 4 years ago
- ☆88Updated 9 months ago
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- ☆48Updated 2 months ago
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 2 months ago
- ☆65Updated last year
- ☆120Updated last month
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- Splunk Content Control Tool☆124Updated this week
- Built-in Panther detection rules and policies☆428Updated this week
- The CrowdStrike Falcon SDK for Python☆448Updated last week
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆89Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 4 years ago
- ☆55Updated 4 years ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆336Updated this week
- ☆18Updated 4 years ago
- Phantom Apps Repo☆82Updated 4 years ago
- ☆36Updated this week
- Search a filesystem for indicators of compromise (IoC).☆81Updated last week
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 3 years ago