These workflows are provided for sample usage, new submissions and updates from the community, and are NOT supported by IBM.
☆51Apr 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for IBM-QRadar-Universal-Cloud-REST-API
Users that are interested in IBM-QRadar-Universal-Cloud-REST-API are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Resilient Automation Functions and Scripts☆15Jan 5, 2022Updated 4 years ago
- Sample applications for use with the QRadar application framework☆16Feb 19, 2021Updated 5 years ago
- Python utility functions for QRadar☆34Sep 17, 2025Updated 7 months ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87May 8, 2025Updated 11 months ago
- Samples code that uses QRadar API's☆209May 20, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Developer documentation for Resilient APIs☆25Updated this week
- ☆11Oct 12, 2021Updated 4 years ago
- QRadar Sample Apps for use with V2 of the QRadar App Framework☆23Sep 17, 2025Updated 7 months ago
- ☆59Sep 17, 2025Updated 7 months ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆59Jun 11, 2019Updated 6 years ago
- IBM QRadar opinionated API client in Go☆13Mar 15, 2023Updated 3 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Cisco Certified CyberOps Associate 200-201 Certification Guide, published by Packt☆29Jan 30, 2023Updated 3 years ago
- Scripts to automatically import threat intel into QRadar☆14Jun 20, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆15Jun 4, 2018Updated 7 years ago
- Splunk Stuffs!☆14Oct 14, 2023Updated 2 years ago
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆35May 12, 2017Updated 8 years ago
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- ☆13Feb 22, 2017Updated 9 years ago
- Trivial Network File System for 8 bit systems☆13Jan 8, 2026Updated 3 months ago
- Network Appliance Backups in PowerShell☆29Jan 5, 2023Updated 3 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated last year
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Apr 8, 2026Updated 3 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Task Sequence Debugger for MDT☆20Jul 21, 2020Updated 5 years ago
- Complete translation (EN) of the leaked files related to Conti (chat)☆17Jan 19, 2023Updated 3 years ago
- Adapter to use PicoPSU power supplies in a Sharp X68000 PRO computer☆15Apr 25, 2026Updated last week
- Samples of visualization add-ons to QRadar, utilizing public REST APIs☆33May 17, 2016Updated 9 years ago
- ☆24Dec 3, 2025Updated 5 months ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆49Mar 5, 2026Updated 2 months ago
- ☆21Jan 13, 2022Updated 4 years ago
- ☆13Oct 21, 2024Updated last year
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Amiga UAE Configuration Maker, primarily for UAE4ARM/Amiberry on the Raspberry Pi.☆14Feb 12, 2018Updated 8 years ago
- Sigma Detection Rule Repository☆93Jun 18, 2020Updated 5 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆53Jan 28, 2026Updated 3 months ago
- A Splunk app with saved reports derived from Sigma rules☆73Apr 24, 2018Updated 8 years ago
- CEH Practical Preparation☆12Oct 2, 2022Updated 3 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆22Nov 22, 2021Updated 4 years ago