☆48Jan 15, 2016Updated 10 years ago
Alternatives and similar repositories for data-import
Users that are interested in data-import are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sample applications for use with the QRadar application framework☆16Feb 19, 2021Updated 5 years ago
- Samples code that uses QRadar API's☆209May 20, 2020Updated 6 years ago
- Samples of visualization add-ons to QRadar, utilizing public REST APIs☆33May 17, 2016Updated 10 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Scripts to automatically import threat intel into QRadar☆14Jun 20, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆59Sep 17, 2025Updated 8 months ago
- QRadar Export the rule set for printing☆23Oct 23, 2017Updated 8 years ago
- Python utility functions for QRadar☆34Sep 17, 2025Updated 8 months ago
- Monitor device events using QRadar☆22Sep 17, 2025Updated 8 months ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆33Apr 20, 2023Updated 3 years ago
- This is a frontend for the STIX™ (2.0) language.☆17Dec 20, 2018Updated 7 years ago
- These workflows are provided for sample usage, new submissions and updates from the community, and are NOT supported by IBM.☆51Apr 20, 2026Updated 3 weeks ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- STIX2 graph widget for Jupyter notebooks, powered by stixview library☆25Jan 7, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Repository with logstash, elasticsearch and kibana configs. Palo Alto, Juniper, BlueCoat, etc.☆21Jun 5, 2024Updated last year
- ☆11Aug 11, 2014Updated 11 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- A Python library for handling TAXII Messages invoking TAXII Services.☆74Apr 13, 2026Updated last month
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 4 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 12 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 9 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Jan 8, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- CTFs On Demand☆13Mar 23, 2025Updated last year
- Scripts for TheHive.☆23Nov 15, 2019Updated 6 years ago
- Scripts for Bro IDS and ELK Stack☆56Sep 2, 2015Updated 10 years ago
- Generate STIX XML from OpenIOC XML☆98Oct 18, 2018Updated 7 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Cli interface to threatcrowd.org☆21Jul 6, 2017Updated 8 years ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Feed Generator for MISP☆19Nov 2, 2022Updated 3 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87May 8, 2025Updated last year
- Uncover IPv6 address harvesting through firewall log analysis☆13Jan 29, 2016Updated 10 years ago
- Meer (GPLv2) is a dedicated "spooler" for the Suricata & Sagan EVE output formats.☆23Feb 9, 2021Updated 5 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- Carbon Black Feeds☆73Apr 4, 2023Updated 3 years ago