CrowdStrike / FDRLinks
Falcon Data Replicator
☆35Updated 2 weeks ago
Alternatives and similar repositories for FDR
Users that are interested in FDR are comparing it to the libraries listed below
Sorting:
- Unleash the power of the Falcon Platform at the CLI☆132Updated last month
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆42Updated this week
- ☆98Updated 3 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 8 months ago
- ☆88Updated 8 months ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆242Updated 7 months ago
- ☆189Updated this week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆76Updated last month
- Real-time Response scripts and schema☆119Updated 3 weeks ago
- pocket guide for core detection engineering concepts☆30Updated 2 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆68Updated last year
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- The CrowdStrike Falcon SDK for Python☆446Updated this week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- Phantom Apps Repo☆82Updated 4 years ago
- Run zeek with zeekctl in docker☆56Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- ☆42Updated 4 years ago
- ☆120Updated 2 weeks ago
- Collection of useful Canary tools☆92Updated last week
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 8 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆146Updated 4 months ago
- Cloud security tutorials and best practices☆38Updated 2 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago