IBM / IBM-QRadar-Universal-Cloud-REST-APILinks
These workflows are provided for sample usage, new submissions and updates from the community, and are NOT supported by IBM.
☆51Updated this week
Alternatives and similar repositories for IBM-QRadar-Universal-Cloud-REST-API
Users that are interested in IBM-QRadar-Universal-Cloud-REST-API are comparing it to the libraries listed below
Sorting:
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87Updated 8 months ago
- Source code for IBM SOAR Apps that are available on our App Exchange☆92Updated last week
- ☆58Updated 4 months ago
- LogRhythm PowerShell Toolkit☆53Updated last month
- Home for Splunk security datasets.☆128Updated 5 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 4 months ago
- ☆134Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- This is a repository for freq.py and freq_server.py☆214Updated this week
- Splunk code (SPL) for serious threat hunters and detection engineers.☆289Updated 2 years ago
- A curated list of awesome things related to TheHive & Cortex☆184Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 10 months ago
- ATT&CK Remote Threat Hunting Incident Response☆206Updated last year
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆251Updated 3 weeks ago
- ☆227Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115Updated 5 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Updated 4 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆255Updated 10 months ago
- ☆124Updated 4 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆218Updated 3 months ago
- RBA is Splunk's method to aggregate low-fidelity security events as interesting observations tagged with security metadata to create high…☆63Updated this week
- DDTTX Tabletop Trainings☆28Updated 4 years ago
- Documentation of Cortex☆174Updated 2 years ago
- Splunk Content Control Tool☆127Updated this week
- Python API Client for TheHive☆234Updated 2 months ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Updated 7 years ago
- User guide of MISP☆282Updated last year
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆129Updated 3 years ago
- ☆67Updated 2 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆104Updated 2 years ago