Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.
☆32Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for cbn-tool
Users that are interested in cbn-tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python samples and utilities for Chronicle APIs☆88Nov 7, 2025Updated 5 months ago
- ☆39Mar 26, 2026Updated 2 weeks ago
- Collection of detection rules written in YARA-L.☆30Oct 4, 2025Updated 6 months ago
- Content related to medium.com/@thatsiemguy☆19Nov 16, 2025Updated 4 months ago
- ☆94Mar 19, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Jul 21, 2024Updated last year
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 6 years ago
- A tool that allows you to document and assess any security automation in your SOC☆49Oct 31, 2024Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- line based tcp load balancing proxy.☆14Jun 18, 2024Updated last year
- NSE script to automatically discover SD-WAN nodes☆23Sep 4, 2019Updated 6 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Hogzilla is an Intrusion Detection System (IDS) supported by Snort, Apache Spark, HBase and libnDPI, which provides Network Anomaly Detec…☆28Apr 18, 2018Updated 7 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆35Nov 13, 2025Updated 5 months ago
- ☆65May 21, 2024Updated last year
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 3 months ago
- Parsing Module of Microsoft SQL Server Transaction log☆11May 12, 2023Updated 2 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Zeek package for detecting the Eternal* exploits and a set of SMBv1 protocol violations.☆19Aug 21, 2025Updated 7 months ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- ☆170Sep 30, 2025Updated 6 months ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Free AWS Security Specialty (SCS-C02) study guide with interactive quizzes☆29Mar 15, 2026Updated 3 weeks ago
- Bro scripts to monitor for new hosts within a subnet range that aren't whitelisted/vetted.☆13Jun 28, 2013Updated 12 years ago
- ☆11Dec 7, 2025Updated 4 months ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Use struct tags to read environment variables.☆13Mar 23, 2021Updated 5 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆43Jan 18, 2025Updated last year
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆57Nov 19, 2024Updated last year
- Stenographer is a packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of…☆11Jan 22, 2019Updated 7 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- Documentation for DFIR ORC, artefact collection tool dedicated to Microsoft Windows☆12Updated this week
- Launchd daemon that reports major OSX modifications through growl☆16Feb 19, 2015Updated 11 years ago