CrowdStrike / falcon-orchestrator
CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities
☆186Updated last year
Alternatives and similar repositories for falcon-orchestrator:
Users that are interested in falcon-orchestrator are comparing it to the libraries listed below
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Powershell Threat Hunting Module☆283Updated 8 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- Carbon Black API - Python language bindings☆145Updated 8 months ago
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆245Updated 3 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆337Updated 2 years ago
- Office365 Log Analysis Framework☆82Updated 5 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- ☆73Updated 7 years ago
- Invoke-LiveResponse☆147Updated 3 years ago
- Salt States for Configuring the SIFT Workstation☆102Updated this week
- A Splunk app to use MISP in background☆110Updated last month
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- Carbon Black Feeds☆72Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 4 months ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Main Build directory☆179Updated 6 years ago
- Tools for the Computer Incident Response Team☆144Updated 8 years ago
- Multithreaded threat Intelligence gathering built with Python3☆174Updated 7 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Tools to automate and/or expedite response.☆114Updated 10 months ago
- ☆190Updated 11 months ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆199Updated 8 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆203Updated 3 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆90Updated 7 years ago
- ☆276Updated 2 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago