aholzel / SA-dmarcLinks
Splunk app for visualization of DMARC RUA mails
☆14Updated last year
Alternatives and similar repositories for SA-dmarc
Users that are interested in SA-dmarc are comparing it to the libraries listed below
Sorting:
- Add-on for ingesting DMARC aggregate reports into Splunk☆15Updated 2 years ago
- ☆55Updated 3 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- ☆28Updated 2 months ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- the fastest way to consume threat intelligence.☆31Updated 2 years ago
- WebUI of MineMeld☆43Updated 2 years ago
- Splunk csv to KVStore ES Threat Intel☆11Updated 9 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- misp-cloud - Cloud-ready images of MISP☆73Updated 3 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 5 years ago
- automate your MISP installs☆68Updated 5 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- Expert Investigation Guides☆50Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- ☆24Updated 5 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- CrowdStrike Threat Intelligence☆36Updated 2 years ago
- MineMeld nodes for MISP☆19Updated last year
- Zeek support for Community ID flow hashing.☆37Updated 2 years ago
- ☆36Updated 4 years ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆102Updated 5 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Recon Hunt Queries☆78Updated 4 years ago
- Best practices in threat intelligence☆48Updated 2 years ago