ExtraHop / code-examplesLinks
ExtraHop public code examples
☆36Updated last year
Alternatives and similar repositories for code-examples
Users that are interested in code-examples are comparing it to the libraries listed below
Sorting:
- ☆94Updated this week
- ☆34Updated 4 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 4 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11Updated 2 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated 3 months ago
- Plugin source code for the InsightConnect SOAR product, developer documentation at https://docs.rapid7.com/insightconnect/getting-started☆69Updated last week
- Official Palo Alto Networks MineMeld docker☆17Updated 5 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆29Updated last year
- ☆53Updated last week
- Palo Alto Networks App for Splunk leverages the data visibility provided by Palo Alto Networks next-generation firewalls and endpoint sec…☆108Updated last year
- Tools and scripts by Arctic Wolf☆70Updated 6 months ago
- ☆56Updated 4 years ago
- VMware Carbon Black Cloud Python SDK☆44Updated 6 months ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- Wazuh - Splunk App☆56Updated last year
- Corelight@Home script☆46Updated 2 years ago
- Logs key Windows process performance metrics. #nsacyber☆68Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Python idiomatic SDK for Cortex™ Data Lake.☆48Updated 9 months ago
- Intrusion Detection Honeypots Book Code☆26Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Updated 3 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- Tools to assist in forensicating docker☆85Updated 10 months ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Updated 6 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Documentation used for Shuffle☆21Updated this week