Truvis / Splunk_TA_Truvis_Suricata5
This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup a Suricata Port Mirrored Server
☆15Updated 4 years ago
Alternatives and similar repositories for Splunk_TA_Truvis_Suricata5:
Users that are interested in Splunk_TA_Truvis_Suricata5 are comparing it to the libraries listed below
- Collection of Dashboards for Threat Hunting and more!☆63Updated 4 years ago
- A collection of scripts useful in management of Splunk deployment☆20Updated 6 months ago
- ☆34Updated last year
- Incident Response Network Tools☆24Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆38Updated 2 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 3 years ago
- Various Splunk Scripts and applets, all in one place☆32Updated 2 months ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- Run zeek with zeekctl in docker☆51Updated 5 months ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆12Updated 3 years ago
- ☆15Updated 5 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 4 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- incident response scripts☆19Updated 5 years ago
- scripts to configure the Splunk Universal Forwarder in a locked down state☆40Updated 6 years ago
- ☆12Updated 5 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- MineMeld nodes for MISP☆19Updated last year
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 2 months ago
- A Splunk technology add-on for osquery☆14Updated 3 years ago
- ☆14Updated 4 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- ☆33Updated 6 years ago
- A script to create and assign SOP tasks into the cases☆18Updated 4 years ago
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆12Updated last year