CrowdStrike / falcon-integration-gateway
Falcon Integration Gateway (FIG)
☆18Updated last month
Alternatives and similar repositories for falcon-integration-gateway:
Users that are interested in falcon-integration-gateway are comparing it to the libraries listed below
- ☆18Updated 3 years ago
- Security Alert Decoration☆27Updated 3 weeks ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Documentation used for Shuffle☆19Updated last week
- ☆34Updated 3 years ago
- Global Security Database Tools☆42Updated last year
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆65Updated last month
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 3 months ago
- Build Automated Machine Images for MISP☆28Updated last year
- ☆11Updated 4 years ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated last year
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 3 weeks ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- ☆12Updated 5 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated 2 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago