Krook9d / TA-Purplelab-Splunk
Splunk add-on related to the PurpleLab tool
☆39Updated last year
Alternatives and similar repositories for TA-Purplelab-Splunk:
Users that are interested in TA-Purplelab-Splunk are comparing it to the libraries listed below
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆52Updated last year
- SIEM Cheat Sheet☆73Updated last year
- AI-Powered Dark Web OSINT Tool☆51Updated last week
- ☆45Updated last year
- Knowledge base on cybercriminal concealment techniques☆31Updated this week
- ☆175Updated last year
- ☆33Updated 5 months ago
- ☆102Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆21Updated 4 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆98Updated 2 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated last month
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆29Updated 7 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆139Updated this week
- Automation tool for Windows Deception Host Burn-In☆85Updated 5 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated last year
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆28Updated 2 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 10 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly…☆21Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated last month
- MISP Playbooks☆199Updated 2 months ago
- ☆210Updated 11 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated 2 years ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆239Updated last week
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆90Updated last week
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆73Updated 2 weeks ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆35Updated this week
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆101Updated 8 months ago