SteveMcGrath / pySecurityCenter
☆101Updated 6 years ago
Alternatives and similar repositories for pySecurityCenter:
Users that are interested in pySecurityCenter are comparing it to the libraries listed below
- ☆140Updated 8 months ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 4 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 6 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆163Updated 6 years ago
- Sandia Cyber Omni Tracker (SCOT)☆246Updated 2 months ago
- Engine of MineMeld☆141Updated last year
- Carbon Black API - Python language bindings☆146Updated 5 months ago
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- Carbon Black API Resources☆93Updated 7 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- Bro scripts written by CrowdStrike Services☆146Updated 3 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Updated 5 years ago
- ☆48Updated 9 years ago
- Samples code that uses QRadar API's☆199Updated 4 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆76Updated 7 years ago
- Query and report user logons relations from MS Windows Security Events☆241Updated 6 years ago
- ☆36Updated 8 years ago
- Dockerfiles for NSM tools☆84Updated 7 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Threat Intelligence APIs☆275Updated last year
- Extract files from network traffic with Zeek.☆100Updated 4 years ago
- Syslog Connector for the Carbon Black Cloud☆29Updated 4 months ago
- Salt States for Configuring the SIFT Workstation☆97Updated this week