Truvis / Splunk_TA_Truvis_Suricata5
This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup a Suricata Port Mirrored Server
☆15Updated 4 years ago
Alternatives and similar repositories for Splunk_TA_Truvis_Suricata5:
Users that are interested in Splunk_TA_Truvis_Suricata5 are comparing it to the libraries listed below
- Collection of Dashboards for Threat Hunting and more!☆68Updated 4 years ago
- incident response scripts☆19Updated 6 years ago
- Corelight@Home script☆41Updated last year
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆19Updated 4 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 4 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- ☆34Updated last year
- A free incident response management and documentation workbook☆24Updated 6 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆22Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Workflows for Shuffle☆21Updated 2 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 4 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Using QRadar API☆20Updated 7 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Triage automation for suspect URLs☆13Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- MineMeld nodes for MISP☆19Updated last year
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago