IBM / integrating-rpa-and-qradar-automate-security-activities
Integrate IBM QRadar and RPA to automate security L1 tasks.
☆14Updated 2 years ago
Alternatives and similar repositories for integrating-rpa-and-qradar-automate-security-activities:
Users that are interested in integrating-rpa-and-qradar-automate-security-activities are comparing it to the libraries listed below
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- Using QRadar API☆20Updated 6 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated last week
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Expert Investigation Guides☆51Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 2 months ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆16Updated 4 years ago
- ☆29Updated 6 years ago
- Presentation Slides and Video links☆31Updated 3 years ago
- A free incident response management and documentation workbook☆22Updated 6 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- incident response scripts☆19Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated last year
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆36Updated 4 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆12Updated 4 years ago
- ☆34Updated 3 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆59Updated 2 years ago
- ☆34Updated 4 years ago
- A script to create and assign SOP tasks into the cases☆18Updated 4 years ago
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- Documentation used for Shuffle☆19Updated this week