carbonblack / cb-integrationLinks
Carbon Black integration Python utility library
☆12Updated 4 years ago
Alternatives and similar repositories for cb-integration
Users that are interested in cb-integration are comparing it to the libraries listed below
Sorting:
- Report Generation from the Carbon Black REST API☆15Updated 3 years ago
- Subscribe to raw VMware Carbon Black EDR event feed and forward to another system, such as Splunk.☆73Updated last year
- Example Splunk Alert Scripts☆20Updated 10 years ago
- ☆55Updated 3 years ago
- Carbon Black Feeds☆73Updated 2 years ago
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 4 years ago
- Carbon Black API Resources☆93Updated 7 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Splunk csv to KVStore ES Threat Intel☆11Updated 9 years ago
- A framework for receiving and redistributing abuse feeds☆124Updated 6 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Carbon Black API - Python language bindings☆145Updated last year
- Python IOC Editor☆63Updated 10 years ago
- Community driven repository of Playbooks and Apps for ThreatConnect.☆72Updated last month
- Generate STIX XML from OpenIOC XML☆92Updated 6 years ago
- An OpenTAXII Configuration for MISP☆84Updated 3 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- Checks with NSRL RDS servers looking for for hash matches☆114Updated 4 years ago
- MantaRay Automated Computer Forensic Triage Tool☆64Updated 6 years ago
- Example programs used in the automating DFIR series☆63Updated 6 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆91Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- Sysmon Splunk App☆47Updated 7 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- ☆24Updated 9 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- Bro-IDS scripts☆50Updated 9 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- Hunting IOCs all day every day...☆86Updated 2 years ago