chronicle / cbn-tool
Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.
☆28Updated last year
Alternatives and similar repositories for cbn-tool:
Users that are interested in cbn-tool are comparing it to the libraries listed below
- ☆93Updated 2 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- Python samples and utilities for Chronicle APIs☆81Updated 3 weeks ago
- A CLI tool for managing Chronicle user workflows☆16Updated 10 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 11 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆52Updated 2 years ago
- Collection of detection rules written in YARA-L.☆23Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆109Updated 3 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆76Updated 9 months ago
- ☆29Updated 5 months ago
- Content related to medium.com/@thatsiemguy☆14Updated last month
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 4 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆86Updated last year
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆39Updated 4 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated last week
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated 11 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆156Updated 2 weeks ago
- OSSEM Data Dictionaries☆59Updated last month
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated last month
- ☆42Updated 2 years ago
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆194Updated 5 months ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆108Updated last month
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆205Updated this week
- Automating Security Detection Engineering, published by Packt☆54Updated 4 months ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆78Updated last year
- A repository of my own Sigma detection rules.☆157Updated 5 months ago