chronicle / cli
A CLI tool for managing Chronicle user workflows
☆16Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for cli
- ☆26Updated last month
- Python samples and utilities for Chronicle APIs☆77Updated this week
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆27Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆145Updated last week
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆93Updated 2 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆97Updated this week
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆66Updated last week
- Collection of Jupyter Notebooks by @fr0gger_☆142Updated 2 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆27Updated last month
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆51Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆49Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆72Updated 2 weeks ago
- ☆99Updated 5 months ago
- pySigma Cookiecutter backend template☆21Updated last week
- ☆83Updated 3 months ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆17Updated last year
- Automating Security Detection Engineering, published by Packt☆47Updated last month
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆26Updated this week
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆62Updated 6 months ago
- BlackBerry Threat Research & Intelligence☆93Updated last year
- A community event for security researchers to share their favorite notebooks☆106Updated 9 months ago
- Remote access and Antivirus Logging Database☆41Updated 6 months ago
- A lab environment for learning about MSTICPy☆36Updated last year
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 5 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆153Updated 2 years ago
- Collection of detection rules written in YARA-L.☆20Updated 8 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆104Updated 2 weeks ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆26Updated last year
- Intelligence Architecture Mind Map☆117Updated 8 months ago