Python samples and utilities for Chronicle APIs
☆88Nov 7, 2025Updated 5 months ago
Alternatives and similar repositories for api-samples-python
Users that are interested in api-samples-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of example YARA-L rules for use within Google Security Operations☆484Dec 5, 2025Updated 4 months ago
- ☆39Mar 26, 2026Updated 2 weeks ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- A CLI tool for managing Chronicle user workflows☆18Sep 24, 2025Updated 6 months ago
- Collection of detection rules written in YARA-L.☆30Oct 4, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Content related to medium.com/@thatsiemguy☆19Nov 16, 2025Updated 4 months ago
- ☆65May 21, 2024Updated last year
- Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud☆365Jun 12, 2024Updated last year
- Utility functions to troubleshoot for GCP IAM Permissions, Roles and Resources☆12Oct 14, 2022Updated 3 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- A helper SDK to wrap the Google SecOps API for common security use cases☆72Apr 2, 2026Updated last week
- ☆13Oct 7, 2019Updated 6 years ago
- ☆82Sep 10, 2012Updated 13 years ago
- \B\C\M\C\ Open Source Software☆20Jan 3, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Busted. With duct tape, spit and tears. Brought to you by beer.☆12Nov 4, 2021Updated 4 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model☆11Mar 24, 2016Updated 10 years ago
- Vault Plugin: Google Cloud Platform CA Service☆17Jul 20, 2021Updated 4 years ago
- ☆32Aug 21, 2023Updated 2 years ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- pySigma Cookiecutter backend template☆24Sep 17, 2025Updated 6 months ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆43Apr 21, 2023Updated 2 years ago
- VSCode extension for the YARA pattern matching language☆63Jan 10, 2024Updated 2 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 5 months ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- Using ImpersonatedCredentials for Google Cloud API and id_tokens☆16Aug 22, 2022Updated 3 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- ☆12Feb 21, 2022Updated 4 years ago
- Take automated actions against threats and vulnerabilities.☆216Sep 14, 2023Updated 2 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- AWS STS token decoder☆47Mar 18, 2025Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 3 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆11Jun 2, 2021Updated 4 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago