chrivand / talos_blog_to_casebook
This is a sample script how to parse the Talos blogs, and automatically add observables to Cisco Casebook.
☆18Updated last year
Alternatives and similar repositories for talos_blog_to_casebook:
Users that are interested in talos_blog_to_casebook are comparing it to the libraries listed below
- Scripts that cover the basics of interacting with the AMP for Endpoints API☆17Updated 5 years ago
- Tools for simulating threats☆181Updated last year
- Repository of SentinelOne Deep Visibility queries.☆121Updated 3 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆195Updated 4 years ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆220Updated last month
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆52Updated 5 years ago
- A list of Splunk queries that I've collected and used over time.☆74Updated 4 years ago
- ☆13Updated last year
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆109Updated 2 weeks ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆289Updated 4 months ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆249Updated 3 years ago
- ☆54Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆123Updated 3 weeks ago
- ☆55Updated 3 years ago
- Real-time Response scripts and schema☆107Updated last year
- SentinelOne STAR Rules☆54Updated last year
- ☆41Updated 8 months ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- SPL cheatsheet for Splunk.☆20Updated 2 years ago
- IronSkillet is a set of day-one configuration templates for PAN-OS to enable alignment with security best practices. See the Quick Start …☆203Updated last year
- ☆42Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆113Updated 3 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆241Updated last week
- LogRhythm PowerShell Toolkit☆50Updated last week
- ATT&CK Remote Threat Hunting Incident Response☆198Updated last month
- Consolidation of various resources related to Microsoft Sysmon & sample data/log☆106Updated 3 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆61Updated 2 years ago
- MISP to Sentinel integration☆62Updated 2 months ago
- ☆31Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year