MrM8BRH / Splunk
This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics and monitoring platform. The repository contains several Markdown files and other that provide valuable information and instructions for various aspects of working with Splunk.
☆20Updated this week
Related projects: ⓘ
- ☆24Updated 10 months ago
- SPL cheatsheet for Splunk.☆20Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆73Updated 2 years ago
- A list of Splunk queries that I've collected and used over time.☆70Updated 3 years ago
- Some important DFIR Resources☆81Updated last year
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- ☆52Updated 3 years ago
- ☆40Updated last year
- SIEM Cheat Sheet☆73Updated last year
- Cybersecurity Incident Response Plan☆86Updated 3 years ago
- links collected from SOC Core Skills class☆84Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆50Updated 5 years ago
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- Tools for simulating threats☆170Updated 10 months ago
- ☆50Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 2 years ago
- Conference presentations☆45Updated 11 months ago
- A collection of various SIEM rules relating to malware family groups.☆60Updated 3 months ago
- A list of resources to build a information security team.☆13Updated 3 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 4 months ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆31Updated 9 months ago
- ☆38Updated last year
- Windows Malware Investigation Scripts & Docs☆74Updated 6 months ago
- Some of the tools we use during vCISO engagements☆14Updated 2 years ago
- ☆15Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- Some Threat Hunting queries useful for blue teamers☆120Updated 2 years ago
- SentinelOne STAR Rules☆45Updated 10 months ago