chronicle / api-samples-python
Python samples and utilities for Chronicle APIs
☆79Updated last month
Alternatives and similar repositories for api-samples-python:
Users that are interested in api-samples-python are comparing it to the libraries listed below
- A community event for security researchers to share their favorite notebooks☆107Updated 11 months ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆28Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆43Updated this week
- ☆26Updated 3 months ago
- The FASTEST way to consume threat intel.☆65Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆77Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆120Updated 4 years ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆28Updated last year
- A CALDERA plugin☆74Updated 2 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 10 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆107Updated this week
- ☆100Updated 7 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆104Updated 2 months ago
- OSSEM Common Data Model☆55Updated 2 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated last month
- Collection of Jupyter Notebooks by @fr0gger_☆145Updated 4 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- ☆33Updated last week
- ☆27Updated 3 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 7 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆77Updated 3 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆34Updated last month
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 7 months ago
- misp-cloud - Cloud-ready images of MISP☆72Updated 2 years ago
- pocket guide for core detection engineering concepts☆27Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆153Updated last month