ExabeamLabs / Content-Library-CIM1Links
☆17Updated last year
Alternatives and similar repositories for Content-Library-CIM1
Users that are interested in Content-Library-CIM1 are comparing it to the libraries listed below
Sorting:
- ☆74Updated last month
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆59Updated 3 years ago
- A MITRE Caldera plugin☆49Updated last month
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 4 months ago
- Open-source Fabric templates for cybersecurity and compliance☆25Updated 10 months ago
- ☆99Updated last week
- A collection of tips for using MISP.☆74Updated 11 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆51Updated 6 months ago
- Anvilogic Forge☆110Updated last month
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆81Updated 3 weeks ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆67Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆97Updated 2 months ago
- ☆19Updated 4 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 7 months ago
- An open source platform to support analysts to organise their case and tasks☆108Updated this week
- ☆44Updated 4 months ago
- ☆51Updated last month
- Library of threat hunts to get any user started!☆45Updated 5 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆53Updated 3 weeks ago
- A home for detection content developed by the delivr.to team☆73Updated 3 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆86Updated last week
- A pySigma wrapper to manage detection rules.☆41Updated last month
- ☆77Updated last week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆51Updated 2 years ago
- Open Threat Hunting Framework☆121Updated 2 years ago