CrowdStrike / Identity-ProtectionLinks
☆14Updated 7 months ago
Alternatives and similar repositories for Identity-Protection
Users that are interested in Identity-Protection are comparing it to the libraries listed below
Sorting:
- Real-time Response scripts and schema☆118Updated last year
- This repository contains Community and Field contributed content for LogScale☆272Updated last week
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆261Updated 4 years ago
- Repository of SentinelOne Deep Visibility queries.☆133Updated 4 years ago
- PowerShell for CrowdStrike's OAuth2 APIs☆435Updated this week
- A list of Splunk queries that I've collected and used over time.☆86Updated 4 years ago
- LogRhythm PowerShell Toolkit☆51Updated last month
- The CrowdStrike Falcon SDK for Python☆435Updated 3 weeks ago
- Tools for simulating threats☆193Updated last year
- ☆87Updated 6 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆210Updated 5 years ago
- Scripts to streamline the deployment and use of the CrowdStrike Falcon sensor☆188Updated 2 months ago
- InsightVM helpful SQL queries☆71Updated 7 months ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆485Updated 10 months ago
- Open Source Security Operations Center Documentation☆195Updated 3 months ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆25Updated 7 months ago
- Cyber Incident Response Team Playbook Battle Cards☆416Updated last year
- MISP to Sentinel integration☆74Updated last month
- ☆41Updated 2 years ago
- ☆80Updated last year
- SentinelOne STAR Rules☆69Updated 7 months ago
- Web based S1 query navigator for one-click threat hunting☆23Updated 4 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated last month
- Security Scripts and Sources for daily usage.☆65Updated 3 months ago
- ☆15Updated last month
- Cybersecurity Incident Response Plan☆105Updated 5 years ago
- Splunk Boss of the SOC version 3 dataset.☆373Updated 5 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 4 years ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆240Updated 9 months ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆157Updated 2 weeks ago