TheIRGurus / PlaybooksLinks
Playbooks designed for IBM SOAR developed by The IR Gurus. These playbooks can be used to demonstrate how to design playbooks, perform automations, and expand your SOP library within your environment.
☆17Updated last year
Alternatives and similar repositories for Playbooks
Users that are interested in Playbooks are comparing it to the libraries listed below
Sorting:
- ☆58Updated 2 months ago
- ☆66Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆120Updated 2 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆215Updated last month
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Updated 4 years ago
- Source code for IBM SOAR Apps that are available on our App Exchange☆92Updated last week
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- ☆28Updated 2 weeks ago
- ☆13Updated last year
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆14Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 9 months ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- SentinelOne STAR Rules☆69Updated 10 months ago
- Practical Orientation Of MVISION EDR Query Language☆34Updated 2 years ago
- Example scripts and rules for use in Resilient playbooks.☆35Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆118Updated 8 months ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆86Updated 7 months ago
- Jupyter notebooks for threat hunting☆60Updated 8 months ago
- Repository of SentinelOne Deep Visibility queries.☆134Updated 4 years ago
- Scripts to facilitate filtering with Plaso☆127Updated 5 years ago
- ☆15Updated 3 months ago
- LogRhythm PowerShell Toolkit☆52Updated 3 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆141Updated last year
- OSSEM Detection Model☆180Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- Tools for simulating threats☆197Updated 2 years ago
- ☆47Updated 3 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆27Updated 4 years ago
- Resources To Learn And Understand SIGMA Rules☆181Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago