MSISAC / STIX-TAXII-Integration
☆28Updated 5 years ago
Alternatives and similar repositories for STIX-TAXII-Integration
Users that are interested in STIX-TAXII-Integration are comparing it to the libraries listed below
Sorting:
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆217Updated 3 months ago
- Security-Focused O365 Management and Log Scripts☆60Updated 2 years ago
- ☆41Updated 3 weeks ago
- An open source custom password filter DLL and userspace service to better protect / control Active Directory domain passwords.☆59Updated 7 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆203Updated 7 years ago
- Engine of MineMeld☆141Updated 2 years ago
- Backup of my phishing regular expression testing bench☆147Updated 8 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- Main MineMeld documentation repo☆380Updated 7 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Carbon Black API - Python language bindings☆145Updated 8 months ago
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆60Updated 7 months ago
- Subscribe to raw VMware Carbon Black EDR event feed and forward to another system, such as Splunk.☆73Updated last year
- Salt States for Configuring the SIFT Workstation☆102Updated last week
- LogRhythm PowerShell Toolkit☆51Updated 3 months ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- Simple integration script for 3rd party systems such as SIEMs. Offers command line, file or syslog output in CEF, JSON or key-value pair …☆131Updated last year
- PerchLabs threat feed☆16Updated 3 years ago
- Customized NXLog configuration used to generate data from Windows endpoints that can be leveraged by teams for better insight into host-a…☆18Updated 3 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- ☆49Updated 4 years ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆214Updated 2 months ago
- Office365 Log Analysis Framework☆82Updated 5 years ago
- Sysmon configuration☆65Updated 6 years ago
- WebUI of MineMeld☆43Updated 2 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆199Updated 8 years ago
- Carbon Black Feeds☆72Updated 2 years ago