CrowdStrike / falcon-integration-gateway
Falcon Integration Gateway (FIG)
☆18Updated 3 weeks ago
Alternatives and similar repositories for falcon-integration-gateway:
Users that are interested in falcon-integration-gateway are comparing it to the libraries listed below
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- Documentation used for Shuffle☆19Updated this week
- ☆11Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Security Alert Decoration☆26Updated 3 weeks ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated 2 years ago
- ☆21Updated last year
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- ☆18Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- Scripts for Qualys Cloud Security offerings☆14Updated 4 years ago
- ☆34Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- ☆55Updated this week
- ☆29Updated 6 years ago
- ☆11Updated 8 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated 3 weeks ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 9 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 months ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- ☆12Updated 3 months ago
- pocket guide for core detection engineering concepts☆27Updated last year