☆48Jan 15, 2016Updated 10 years ago
Alternatives and similar repositories for data-import
Users that are interested in data-import are comparing it to the libraries listed below
Sorting:
- Samples code that uses QRadar API's☆209May 20, 2020Updated 5 years ago
- Samples of visualization add-ons to QRadar, utilizing public REST APIs☆33May 17, 2016Updated 9 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Scripts to automatically import threat intel into QRadar☆14Jun 20, 2019Updated 6 years ago
- ☆60Sep 17, 2025Updated 6 months ago
- QRadar Export the rule set for printing☆23Oct 23, 2017Updated 8 years ago
- Python utility functions for QRadar☆34Sep 17, 2025Updated 6 months ago
- Monitor device events using QRadar☆22Sep 17, 2025Updated 6 months ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Apr 20, 2023Updated 2 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Python Module for creating Log Event Extended Format events for IBM QRadar☆12Jun 4, 2016Updated 9 years ago
- STIX2 graph widget for Jupyter notebooks, powered by stixview library☆25Jan 7, 2023Updated 3 years ago
- Repository with logstash, elasticsearch and kibana configs. Palo Alto, Juniper, BlueCoat, etc.☆20Jun 5, 2024Updated last year
- ☆11Aug 11, 2014Updated 11 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- A Python library for handling TAXII Messages invoking TAXII Services.☆73Apr 21, 2021Updated 4 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 11 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Jan 8, 2023Updated 3 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- CTFs On Demand☆13Mar 23, 2025Updated 11 months ago
- A simple Nessus results viewer☆49Aug 30, 2013Updated 12 years ago
- Scripts for TheHive.☆23Nov 15, 2019Updated 6 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago
- Security-Focused O365 Management and Log Scripts☆62Oct 27, 2022Updated 3 years ago
- Scripts for Bro IDS and ELK Stack☆57Sep 2, 2015Updated 10 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Feed Generator for MISP☆19Nov 2, 2022Updated 3 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- This is a demo of a TCP hijacking (telnet) using Mininet and Ettercap.☆12Sep 24, 2015Updated 10 years ago
- The OpenFISMA project is an open source application designed to reduce the complexity and automate the regulatory requirements of the Fed…☆10Apr 21, 2015Updated 10 years ago
- Uncover IPv6 address harvesting through firewall log analysis☆13Jan 29, 2016Updated 10 years ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Feb 9, 2021Updated 5 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- Carbon Black Feeds☆73Apr 4, 2023Updated 2 years ago