SigmaHQ / pySigma-backend-insightidr
☆14Updated 4 months ago
Alternatives and similar repositories for pySigma-backend-insightidr:
Users that are interested in pySigma-backend-insightidr are comparing it to the libraries listed below
- ☆54Updated last year
- ☆4Updated 3 months ago
- ☆72Updated 3 months ago
- ☆42Updated 2 years ago
- A collection of tips for using MISP.☆74Updated last month
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆49Updated 2 years ago
- ☆41Updated last year
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year
- MISP to Sentinel integration☆62Updated 2 months ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 8 months ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆41Updated 2 years ago
- ☆51Updated 8 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆60Updated 9 months ago
- A PowerShell incident response script for quick triage☆78Updated 2 years ago
- SentinelOne STAR Rules☆54Updated last year
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆21Updated 3 months ago
- Full of public notes and Utilities☆95Updated 2 months ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆39Updated 4 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆82Updated last week
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- A repository to share publicly available Velociraptor detection content☆124Updated this week
- ☆82Updated 3 weeks ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated last month
- Detection of obfuscated Powershell commands☆54Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 10 months ago