ExabeamLabs / Content-Library-CIM1Links
☆17Updated last year
Alternatives and similar repositories for Content-Library-CIM1
Users that are interested in Content-Library-CIM1 are comparing it to the libraries listed below
Sorting:
- ☆94Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.☆94Updated this week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 3 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated last year
- A collection of tips for using MISP.☆74Updated 9 months ago
- ☆44Updated 2 months ago
- Data visualization for blue teams☆126Updated 2 years ago
- A MITRE Caldera plugin☆45Updated 9 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated 2 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 2 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆80Updated last week
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆66Updated last year
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 5 months ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆33Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 8 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 2 years ago
- ☆74Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆127Updated 4 months ago
- An index of publicly available and open-source threat detection rulesets.☆122Updated 4 months ago
- Anvilogic Forge☆107Updated 2 weeks ago
- A home for detection content developed by the delivr.to team☆70Updated last month
- An open source platform to support analysts to organise their case and tasks☆105Updated last week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆157Updated 6 months ago
- ☆47Updated 6 months ago
- Mapping of open-source detection rules and atomic tests.☆176Updated 7 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆47Updated 4 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆84Updated last year
- OSSEM Data Dictionaries☆62Updated 7 months ago