arosenmund / DCO
☆11Updated 2 years ago
Alternatives and similar repositories for DCO:
Users that are interested in DCO are comparing it to the libraries listed below
- Import Bro logs from SecurityOnion into Logstash☆15Updated 9 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- Carbon Black Feeds☆72Updated last year
- The Bro/Zeek language cheat sheet☆51Updated 11 years ago
- Sysmon Splunk App☆46Updated 6 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Dashboards and loader for ROCK NSM dashboards☆48Updated last year
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆37Updated 2 years ago
- ☆48Updated 4 years ago
- ☆55Updated 2 years ago
- ☆48Updated 9 years ago
- Subscribe to raw VMware Carbon Black EDR event feed and forward to another system, such as Splunk.☆73Updated 9 months ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago
- Salt States for Configuring the SIFT Workstation☆98Updated this week
- Python library for the ArcSight logger REST API☆27Updated 3 years ago
- Volatility plugins developed and maintained by the community☆21Updated 5 months ago
- Splunk Boss of the SOC v1 data set.☆111Updated 6 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆90Updated 7 years ago
- ☆36Updated 8 years ago
- Office365 Log Analysis Framework☆82Updated 5 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 6 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆68Updated 3 years ago
- Scripts for TheHive.☆22Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆71Updated 8 months ago
- Powering Up Incident Response with Power-Response☆63Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago