Krook9d / TA-Purplelab-Splunk
Splunk add-on related to the PurpleLab tool
☆37Updated 11 months ago
Alternatives and similar repositories for TA-Purplelab-Splunk:
Users that are interested in TA-Purplelab-Splunk are comparing it to the libraries listed below
- ☆32Updated 4 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆81Updated this week
- ☆101Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆61Updated last year
- Mapping of open-source detection rules and atomic tests.☆156Updated 2 months ago
- A powerful home-lab focused on setting up Splunk SIEM and real-world use cases. If you’re interested to become SOC Analyst(Tier 1/2) , th…☆50Updated 11 months ago
- Automation tool for Windows Deception Host Burn-In☆83Updated 3 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆184Updated 8 months ago
- SIEM Cheat Sheet☆73Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆75Updated 2 weeks ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆100Updated 7 months ago
- ☆55Updated 10 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 8 months ago
- ☆74Updated this week
- God Mode Detection Rules☆134Updated 7 months ago
- ☆172Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 9 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆29Updated 9 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆124Updated 8 months ago
- ☆43Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆153Updated 10 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated last month
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last month
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆119Updated 11 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆51Updated 2 weeks ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 2 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their …☆24Updated 4 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆124Updated last year