chronicle / api-samples-python
Python samples and utilities for Chronicle APIs
☆76Updated this week
Related projects: ⓘ
- ☆26Updated last week
- A community event for security researchers to share their favorite notebooks☆105Updated 7 months ago
- A CLI tool for managing Chronicle user workflows☆14Updated 4 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆76Updated 8 months ago
- pySigma Cookiecutter backend template☆20Updated 9 months ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆27Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆49Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆49Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆108Updated 3 years ago
- OSSEM Common Data Model☆54Updated 2 years ago
- Collection of YARA-L 2.0 sample rules for the Chronicle Detection API☆297Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆40Updated last week
- Cisco Orbital - Osquery queries by Talos☆122Updated 3 weeks ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆64Updated 6 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆139Updated 2 weeks ago
- Swagger/ OpenAPI specifications for security products and services☆73Updated 2 weeks ago
- A collection of notebooks built for defensive and offensive operations.☆76Updated 3 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆29Updated 8 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆51Updated last year
- ☆83Updated 2 years ago
- A Python library to help with some common threat hunting data analysis operations☆138Updated last year
- Collection of detection rules written in YARA-L.☆19Updated 6 months ago
- The FASTEST way to consume threat intel.☆62Updated last year
- Splunk Content Control Tool☆81Updated this week
- ☆101Updated this week
- Automating Security Detection Engineering, published by Packt☆42Updated 3 months ago
- This repository contains Enablement Documentation (STIX Shifter), Workgroup documents and materials (Endpoint), Working documents and ou…☆33Updated this week
- txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between th…☆21Updated 2 weeks ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆139Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆73Updated 3 years ago