ExtraHop / code-examplesLinks
ExtraHop public code examples
☆38Updated 11 months ago
Alternatives and similar repositories for code-examples
Users that are interested in code-examples are comparing it to the libraries listed below
Sorting:
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11Updated 2 years ago
- Palo Alto Networks App for Splunk leverages the data visibility provided by Palo Alto Networks next-generation firewalls and endpoint sec…☆108Updated last year
- Coding examples for the OpenDNS Investigate API☆24Updated 5 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 5 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 4 years ago
- ☆55Updated 4 years ago
- Python idiomatic SDK for Cortex™ Data Lake.☆47Updated 7 months ago
- Official Palo Alto Networks MineMeld docker☆17Updated 5 years ago
- ☆34Updated 4 years ago
- Run zeek with zeekctl in docker☆55Updated last year
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- Plugin source code for the InsightConnect SOAR product, developer documentation at https://docs.rapid7.com/insightconnect/getting-started☆69Updated this week
- The PCAP Analyzer for Splunk includes useful Dashboards to analyze network packet capture files from Wireshark or Network Monitor (.pcap)…☆43Updated last year
- Corelight@Home script☆44Updated 2 years ago
- Workflows for Shuffle☆23Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 3 weeks ago
- Documentation and Tools for Cisco's PSIRT openVuln API☆117Updated 6 months ago
- Falcon Integration Gateway (FIG)☆21Updated this week
- ☆77Updated 2 weeks ago
- Documentation used for Shuffle☆21Updated this week
- ☆35Updated 4 years ago
- OSSEM Common Data Model☆56Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Logs key Windows process performance metrics. #nsacyber☆67Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Intrusion Detection Honeypots Book Code☆26Updated 5 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆76Updated last week