Welcome to Sumo Logic's Community Content Repository!
☆108Dec 15, 2025Updated 2 months ago
Alternatives and similar repositories for sumologic-content
Users that are interested in sumologic-content are comparing it to the libraries listed below
Sorting:
- A GUI utility for performing Sumo Logic API tasks that would otherwise require scripting☆36Oct 19, 2021Updated 4 years ago
- Terraform modules for Sumo Logic resources☆16Updated this week
- ☆11Aug 16, 2023Updated 2 years ago
- Fluentd output plugin to deliver logs or metrics to Sumo Logic.☆30Oct 9, 2024Updated last year
- A template for new Hovercraft presentation projects (impress.js slides in reStructuredText)☆12Oct 19, 2017Updated 8 years ago
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Apr 15, 2021Updated 4 years ago
- Sumo Logic Distribution for OpenTelemetry Collector☆51Updated this week
- A collection of lambda functions to collect data from Cloudwatch, Kinesis, VPC Flow logs, S3, security-hub and AWS Inspector☆152Dec 16, 2025Updated 2 months ago
- Batch IP geolocation script.☆21Jul 13, 2017Updated 8 years ago
- An open framework for computer-enabled insider threat investigations. Contribute today!☆25Dec 3, 2025Updated 3 months ago
- Java client for the Sumo Logic API.☆14Mar 28, 2025Updated 11 months ago
- Collection of Dashboards for Threat Hunting and more!☆74Oct 17, 2020Updated 5 years ago
- [DEPRECATED] Argo CD Operator (Helm) installs Argo CD in OpenShift and Kubernetes.☆21Sep 21, 2021Updated 4 years ago
- ☆31Updated this week
- An opinionated way to manage Ansible projects☆22Aug 22, 2019Updated 6 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Apr 29, 2019Updated 6 years ago
- Apps for Splunk Phantom security automation | Cisco Meraki | Ansible Tower | F5 | A10☆24May 29, 2020Updated 5 years ago
- AWS CloudFormation templates for deploying Trend Micro Deep Security Manager and its underlying infrastructure.☆24Sep 9, 2025Updated 5 months ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Loki log provider for OpenFaaS☆27Jan 12, 2024Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆42Jun 27, 2021Updated 4 years ago
- Cloud security tutorials and best practices☆38Mar 20, 2023Updated 2 years ago
- CIS Kubernetes Benchmark - InSpec Profile☆310Aug 9, 2024Updated last year
- ☆11Jan 3, 2025Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- This repository contains Splunk queries to hunt some anomalies☆46Jul 28, 2022Updated 3 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Slack Bot for ChatGPT, Uses reverse engineered official API.☆11Dec 20, 2022Updated 3 years ago
- A chess engine made in rust cause I hate myself☆11May 30, 2025Updated 9 months ago
- ☆11May 21, 2021Updated 4 years ago
- The Dynamic Rules Engine is a serverless application that enables real-time evaluation of rules against sensor data, leveraging AWS Kines…☆11Sep 25, 2024Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 6 years ago
- ghjk is a programmable runtime manager and an attempt at a successor for asdf.☆11Feb 20, 2026Updated last week