chrivand / talos_blog_to_casebook
This is a sample script how to parse the Talos blogs, and automatically add observables to Cisco Casebook.
☆18Updated last year
Related projects ⓘ
Alternatives and complementary repositories for talos_blog_to_casebook
- Scripts that cover the basics of interacting with the AMP for Endpoints API☆17Updated 5 years ago
- Repository of SentinelOne Deep Visibility queries.☆118Updated 3 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆245Updated 3 years ago
- Tools for simulating threats☆174Updated last year
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆191Updated 4 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆51Updated 5 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆122Updated last week
- ☆54Updated 3 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆463Updated 7 months ago
- ☆52Updated last year
- A list of Splunk queries that I've collected and used over time.☆72Updated 4 years ago
- LogRhythm PowerShell Toolkit☆49Updated 2 weeks ago
- MISP to Sentinel integration☆58Updated last week
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆104Updated this week
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆209Updated 3 weeks ago
- IronSkillet is a set of day-one configuration templates for PAN-OS to enable alignment with security best practices. See the Quick Start …☆201Updated last year
- Real-time Response scripts and schema☆104Updated 11 months ago
- ☆66Updated 8 months ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆72Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆111Updated 3 weeks ago
- Repository of attack and defensive information for Business Email Compromise investigations☆228Updated 2 months ago
- ☆30Updated 2 years ago
- SPL cheatsheet for Splunk.☆20Updated last year
- links collected from SOC Core Skills class☆84Updated 3 years ago
- DDTTX Tabletop Trainings☆28Updated 3 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆257Updated 2 years ago
- ☆12Updated last year
- Twitter Search to Cisco Threat Response Casebook [v1.0]☆15Updated last year