GenRockeR / mpsiemlibLinks
MP SIEM SDK
☆26Updated 5 months ago
Alternatives and similar repositories for mpsiemlib
Users that are interested in mpsiemlib are comparing it to the libraries listed below
Sorting:
- реп полезностей для PT MaxPatrol SIEM☆24Updated last year
- Enterprise Response Model & Common Knowledge☆37Updated 2 weeks ago
- Chrome extension for SOC automations☆36Updated last month
- ☆67Updated 4 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated last year
- ☆69Updated 4 months ago
- Incident Response Network Tools☆24Updated 3 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 10 months ago
- pySigma Splunk backend☆40Updated 2 months ago
- Forensic Artifact Collection Tool Matrix☆85Updated 8 months ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- ☆38Updated 3 years ago
- Documentation site for Velociraptor☆48Updated this week
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- ☆35Updated 8 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆67Updated 3 years ago
- Powershell module for VMWare vSphere forensics☆153Updated 8 months ago
- Initial triage of Windows Event logs☆101Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆148Updated 2 years ago
- ☆19Updated 3 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- Random notes collected on the intertubes relating to DFIR☆34Updated 2 years ago
- ESXi Cyber Security Incident Response Script☆24Updated 10 months ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Updated 5 months ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆74Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆103Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 4 months ago