CrowdStrike / Identity-ProtectionLinks
☆13Updated 3 months ago
Alternatives and similar repositories for Identity-Protection
Users that are interested in Identity-Protection are comparing it to the libraries listed below
Sorting:
- Repository of SentinelOne Deep Visibility queries.☆127Updated 3 years ago
- A list of Splunk queries that I've collected and used over time.☆83Updated 4 years ago
- SentinelOne STAR Rules☆62Updated 3 months ago
- ☆59Updated last year
- MISP to Sentinel integration☆67Updated last week
- ☆44Updated 2 years ago
- Tools for simulating threats☆185Updated last year
- InsightVM helpful SQL queries☆64Updated 3 months ago
- Real-time Response scripts and schema☆113Updated last year
- ☆83Updated 2 months ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆201Updated 5 years ago
- Open Source Security Operations Center Documentation☆186Updated 3 weeks ago
- This repository contains Splunk queries to hunt some anomalies☆42Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆141Updated this week
- ☆74Updated last year
- ☆95Updated 2 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆17Updated 3 months ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆55Updated 5 years ago
- LogRhythm PowerShell Toolkit☆51Updated this week
- Practical Threat Detection Engineering, Published by Packt☆71Updated last year
- Security Scripts and Sources for daily usage.☆60Updated 3 weeks ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆145Updated 3 weeks ago
- 2021 SANS DFIR Summit: Greppin' Logs☆20Updated 3 years ago
- This repository contains Community and Field contributed content for LogScale☆231Updated this week
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆54Updated last year
- SPL cheatsheet for Splunk.☆23Updated 2 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 3 years ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 11 months ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year