MHaggis / CBR-Queries
Collection of useful, up to date, Carbon Black Response Queries
☆83Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CBR-Queries
- Converts Sigma detection rules to a Splunk alert configuration.☆107Updated 4 years ago
- ☆39Updated 5 years ago
- Sigma Detection Rule Repository☆85Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Office365 Log Analysis Framework☆81Updated 5 years ago
- ☆115Updated 9 months ago
- A Splunk app to use MISP in background☆109Updated 3 weeks ago
- ☆77Updated 5 years ago
- Invoke-LiveResponse☆145Updated 2 years ago
- CB API scripts for IR, administration, etc.☆32Updated 5 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago
- ☆31Updated last month
- A Splunk app with saved reports derived from Sigma rules☆72Updated 6 years ago
- Cloud Templates and scripts to deploy mordor environments☆127Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆198Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- Dump of organized knowledge on DFIR☆132Updated 3 years ago
- ☆1Updated 3 weeks ago
- Expert Investigation Guides☆50Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 2 years ago
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- ☆41Updated 3 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 4 years ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆20Updated 3 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆162Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆58Updated last year
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆71Updated 10 months ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆41Updated last year