ExabeamLabs / Content-Library-CIM2
☆21Updated last week
Alternatives and similar repositories for Content-Library-CIM2:
Users that are interested in Content-Library-CIM2 are comparing it to the libraries listed below
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- ☆14Updated 9 months ago
- OSSEM Data Dictionaries☆59Updated 3 months ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last month
- Custom Kibana dashboards to secure and monitor Microsoft 365.☆13Updated last year
- OSSEM Detection Model☆177Updated 2 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆65Updated 3 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated this week
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Updated 4 years ago
- Web based S1 query navigator for one-click threat hunting☆19Updated 4 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- A CALDERA plugin☆76Updated this week
- ☆68Updated 2 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- ☆125Updated last year
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆150Updated 2 months ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 4 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆92Updated 3 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆187Updated 3 years ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆41Updated 4 years ago