CrowdStrike / community
CrowdStrike's Open Source Policy & Contribution Guide
☆39Updated last year
Alternatives and similar repositories for community:
Users that are interested in community are comparing it to the libraries listed below
- ☆72Updated 5 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- ☆83Updated 3 weeks ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆39Updated 4 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated 3 weeks ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆53Updated last year
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- Discover for Cloud and Containers Azure☆29Updated 2 months ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- Repository of SentinelOne Deep Visibility queries.☆125Updated 3 years ago
- Advanced Hunting Queries for Microsoft Security Products☆106Updated 2 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆51Updated 3 years ago
- MISP to Sentinel integration☆63Updated this week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆39Updated 11 months ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆83Updated last year
- Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenant.☆121Updated 7 months ago
- Convert Sigma rules to LogRhythm searches☆20Updated 3 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆110Updated 2 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- ☆69Updated last year
- Web based S1 query navigator for one-click threat hunting☆18Updated 4 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆254Updated 4 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆90Updated last month
- ☆26Updated 3 years ago
- Conference presentations☆47Updated last year
- A collection of various SIEM rules relating to malware family groups.☆65Updated 9 months ago
- Security Scripts and Sources for daily usage.☆56Updated 2 weeks ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year