TheIRGurus / PlaybooksLinks
Playbooks designed for IBM SOAR developed by The IR Gurus. These playbooks can be used to demonstrate how to design playbooks, perform automations, and expand your SOP library within your environment.
☆17Updated last year
Alternatives and similar repositories for Playbooks
Users that are interested in Playbooks are comparing it to the libraries listed below
Sorting:
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Updated 4 years ago
- ☆67Updated 2 years ago
- ☆28Updated last month
- OSSEM Detection Model☆182Updated 3 years ago
- SentinelOne STAR Rules☆69Updated 10 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆214Updated 5 years ago
- ☆58Updated 3 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 9 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 8 months ago
- Repository of public reference frameworks for the DFIR community.☆120Updated 2 years ago
- ☆15Updated 4 months ago
- Notes on responding to security breaches relating to Azure AD☆120Updated 3 years ago
- Repository with Sample KQL Query examples for Threat Hunting☆217Updated 3 years ago
- Repository of SentinelOne Deep Visibility queries.☆134Updated 4 years ago
- Source code for IBM SOAR Apps that are available on our App Exchange☆92Updated 2 weeks ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆216Updated 2 months ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87Updated 7 months ago
- MISP to Sentinel integration☆79Updated 3 weeks ago
- Tools for simulating threats☆199Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- Real-time Response scripts and schema☆121Updated 2 months ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆27Updated 4 years ago
- ☆47Updated 3 years ago
- ☆43Updated 3 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆276Updated 4 years ago
- A guide to using Azure Data Explorer and KQL for DFIR☆121Updated 3 years ago
- Jupyter notebooks for threat hunting☆60Updated 9 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- PowerShell module for Office 365 and Azure log collection☆278Updated 3 months ago
- Practical Orientation Of MVISION EDR Query Language☆34Updated 2 years ago