IBM / api-samples
Samples code that uses QRadar API's
☆202Updated 4 years ago
Alternatives and similar repositories for api-samples:
Users that are interested in api-samples are comparing it to the libraries listed below
- ☆119Updated 3 years ago
- Python API Client for TheHive☆223Updated last week
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago
- ☆190Updated 11 months ago
- Documentation of TheHive☆396Updated last year
- Carbon Black API - Python language bindings☆145Updated 8 months ago
- Contains Logstash related content including tons of Logstash configurations☆253Updated 3 years ago
- Main MineMeld documentation repo☆379Updated 7 years ago
- ☆214Updated last year
- QRadar Export the rule set for printing☆22Updated 7 years ago
- ☆48Updated 9 years ago
- Subscribe to raw VMware Carbon Black EDR event feed and forward to another system, such as Splunk.☆73Updated 11 months ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Documentation of Cortex☆174Updated last year
- Bro scripts written by CrowdStrike Services☆146Updated 3 years ago
- Splunk Boss of the SOC v1 data set.☆111Updated 6 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆275Updated last year
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- DEPRECATED - USE v3 (bearded-avenger)☆227Updated 7 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆81Updated 3 weeks ago
- TAXII client implementation from EclecticIQ☆99Updated 3 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆245Updated 3 years ago
- ☆131Updated last year
- A Python library for parsing, manipulating, and generating STIX content.☆244Updated 3 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆202Updated last year
- CASCADE Server☆268Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆111Updated 4 years ago
- A Splunk app to use MISP in background☆110Updated last month
- Data from a BRAWL Automated Adversary Emulation Exercise☆205Updated 4 years ago