IBM / qradar-sample-appsLinks
QRadar Sample Apps for use with V2 of the QRadar App Framework
☆23Updated 4 months ago
Alternatives and similar repositories for qradar-sample-apps
Users that are interested in qradar-sample-apps are comparing it to the libraries listed below
Sorting:
- Sigma rule specification☆172Updated this week
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆39Updated last year
- ☆45Updated 2 months ago
- STIX2 graph visualisation library in JS☆95Updated 2 weeks ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Updated last year
- Cleanup of older MISP events can require some work until now☆27Updated 4 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated last week
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆45Updated this week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆50Updated 7 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Updated this week
- ☆99Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Updated 3 years ago
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- ☆54Updated last year
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆54Updated 4 months ago
- Practical Threat Detection Engineering, Published by Packt☆84Updated 2 years ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆172Updated 2 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆90Updated 4 years ago
- Intelligence Architecture Mind Map☆143Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 10 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆60Updated 3 weeks ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Updated 3 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆36Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Updated last year
- Actionable data for Security Operations☆19Updated 4 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87Updated 9 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques