Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.
☆32Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for cbn-tool
Users that are interested in cbn-tool are comparing it to the libraries listed below
Sorting:
- Collection of example YARA-L rules for use within Google Security Operations☆473Dec 5, 2025Updated 3 months ago
- ☆87Feb 20, 2026Updated last week
- This repository bundles various utilities and scripts I built for use with IBM QRadar SIEM☆16Jan 30, 2026Updated last month
- Converts Netwitness log parser configuration to Logstash configuration☆20Sep 10, 2020Updated 5 years ago
- A tool that allows you to document and assess any security automation in your SOC☆49Oct 31, 2024Updated last year
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 2 months ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- Hogzilla is an Intrusion Detection System (IDS) supported by Snort, Apache Spark, HBase and libnDPI, which provides Network Anomaly Detec…☆28Apr 18, 2018Updated 7 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- ☆33Oct 16, 2025Updated 4 months ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Ansible playbook for installing MineMeld on Linux☆47Mar 18, 2021Updated 4 years ago
- ☆12Mar 14, 2022Updated 3 years ago
- Range Traffic Generator - Used to simulate browsing traffic on a range.☆11May 24, 2017Updated 8 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 2 years ago
- ☆11Dec 7, 2025Updated 2 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆56Feb 21, 2026Updated last week
- Parsing Module of Microsoft SQL Server Transaction log☆11May 12, 2023Updated 2 years ago
- ☆11Oct 16, 2022Updated 3 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- Simple Python3 library for Yeelight Wifi bulbs☆11Nov 12, 2016Updated 9 years ago
- Repository for integration with Apache Kafka☆14Jul 22, 2022Updated 3 years ago
- The hub for all JATS4R meeting notes, examples, draft recommendations, documents, and issues.☆17Sep 8, 2019Updated 6 years ago
- Deep Diff Pizza is a simple, 0 dependency utility function that takes in 2 JSON Objects and returns the differences in an easy-to-use for…☆11Aug 8, 2022Updated 3 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- Automation Framework has many tools commonly used for Network Automation☆10Sep 4, 2025Updated 6 months ago
- Like the British said☆12Nov 15, 2023Updated 2 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Total Anomaly Detection System for software logs and traces☆10Dec 7, 2015Updated 10 years ago
- IOTAcooler, the IOTA Cold Transaction Signer☆11Jun 19, 2019Updated 6 years ago
- Simple interfaces to IOTA smart contract developers.☆11Oct 11, 2021Updated 4 years ago
- Scripts and ideas shared with the community.☆14Updated this week
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- HTTPS Client for www.random.org, optional use of TOR proxy☆14Feb 2, 2014Updated 12 years ago