CrowdStrike / falcon-integration-gatewayLinks
Falcon Integration Gateway (FIG)
☆18Updated last month
Alternatives and similar repositories for falcon-integration-gateway
Users that are interested in falcon-integration-gateway are comparing it to the libraries listed below
Sorting:
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- ☆18Updated 3 years ago
- ☆11Updated 4 years ago
- Security Alert Decoration☆27Updated 2 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- ☆34Updated 4 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Updated last week
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Global Security Database Tools☆43Updated last year
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- ☆11Updated 8 years ago
- Documentation used for Shuffle☆19Updated this week
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 5 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 3 weeks ago
- Workflows for Shuffle☆23Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated this week