A CLI tool for managing Chronicle user workflows
☆18Sep 24, 2025Updated 5 months ago
Alternatives and similar repositories for cli
Users that are interested in cli are comparing it to the libraries listed below
Sorting:
- ☆37Feb 4, 2026Updated 3 weeks ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- Python samples and utilities for Chronicle APIs☆88Nov 7, 2025Updated 3 months ago
- A helper SDK to wrap the Google SecOps API for common security use cases☆65Feb 19, 2026Updated last week
- Chronicle Content Marketplace☆35Updated this week
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- ☆86Feb 20, 2026Updated last week
- Cryptocurrency tax and tracking tools for the Beancount platform.☆11Aug 23, 2024Updated last year
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Dec 31, 2025Updated 2 months ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Create graphed invoice for Google Cloud Platform. You can see billing amount per GCP project.☆11Feb 28, 2022Updated 4 years ago
- Parsing Module of Microsoft SQL Server Transaction log☆11May 12, 2023Updated 2 years ago
- A collection of utility functions for R☆16Jan 19, 2026Updated last month
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- ☆12Jan 22, 2026Updated last month
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- ☆12Feb 16, 2024Updated 2 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated last month
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆12Feb 2, 2026Updated 3 weeks ago
- DeepMBTI is an AI-powered MBTI full-stack predictor application. The app includes an interactive front-end that links to an NLP Log Reg M…☆11Nov 5, 2023Updated 2 years ago
- aries-acapy-plugins☆10Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- ☆13Apr 16, 2025Updated 10 months ago
- This repo demonstrates an Apache Arrow Flight server implementation in Kubernetes.☆12Oct 25, 2024Updated last year
- A framework to support digital engineering in the python language☆12Jul 29, 2025Updated 7 months ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- An agent that performs user actions on a workstation☆12Jan 22, 2018Updated 8 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- ☆13Aug 18, 2023Updated 2 years ago
- Suricata JSON schema project☆12Jan 5, 2020Updated 6 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- Diese Ablage ist die strukturierte Wissensdatenbank der Mint System GmbH.☆13Feb 20, 2026Updated last week
- ☆11May 30, 2024Updated last year
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago