The Palo Alto Networks Add-on for Splunk allows a Splunk® Enterprise or Splunk Cloud administrator to collect data from Palo Alto Networks Next-Generation Firewall devices and Advanced Endpoint Protection.
☆21Aug 7, 2020Updated 5 years ago
Alternatives and similar repositories for Splunk_TA_paloalto
Users that are interested in Splunk_TA_paloalto are comparing it to the libraries listed below
Sorting:
- Palo Alto Networks App for Splunk leverages the data visibility provided by Palo Alto Networks next-generation firewalls and endpoint sec…☆108Oct 7, 2024Updated last year
- Download the latest Palo Alto Networks content update☆13Aug 23, 2018Updated 7 years ago
- scripts and configs from .conf2016 talk on Hunting the Known Unknowns PowerShell Edition☆15Oct 25, 2016Updated 9 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆21Dec 26, 2022Updated 3 years ago
- A command line utility to aid in using autofocus for IR and research☆27Oct 22, 2019Updated 6 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- Fast incident overview☆41Feb 11, 2017Updated 9 years ago
- ☆37May 13, 2020Updated 5 years ago
- ☆97Jul 20, 2023Updated 2 years ago
- Linux integrity monitoring for CentOS/RHEL☆12May 13, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Next Gen Nagios UI☆17Jul 14, 2014Updated 11 years ago
- Skillets is the default holding place for useful Panhandler skillets. These are usually smaller one-off bits that may not require their o…☆13Apr 15, 2020Updated 5 years ago
- Windows Batch script to install and setup the Splunk Universal Forwarder☆11Feb 24, 2020Updated 6 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Blazing fast, modular, next gen logagent☆11Mar 2, 2026Updated last week
- Fluentd Plugin for Splunk☆45Oct 3, 2022Updated 3 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Implementation of Single Page Application (SPA) Proxy security pattern as introduced in the blog post https://medium.facilelogin.com/thir…☆12Dec 18, 2017Updated 8 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- Marlin Simulator UI☆15Feb 19, 2026Updated 2 weeks ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- grok patterns for Asterisk log file☆13Oct 15, 2012Updated 13 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- ☆12Sep 12, 2021Updated 4 years ago