chronicle / ingestion-scriptsLinks
☆33Updated last month
Alternatives and similar repositories for ingestion-scripts
Users that are interested in ingestion-scripts are comparing it to the libraries listed below
Sorting:
- Python samples and utilities for Chronicle APIs☆83Updated 3 weeks ago
- Helm charts for running open source digital forensic tools in Kubernetes☆103Updated this week
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 8 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆164Updated 4 months ago
- Web based S1 query navigator for one-click threat hunting☆21Updated 4 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆20Updated last month
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆82Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Updated this week
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A CLI tool for managing Chronicle user workflows☆19Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆172Updated 3 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆46Updated 2 months ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆38Updated 3 weeks ago
- ☆119Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆64Updated last year
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆31Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 7 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 3 weeks ago
- Anvilogic Forge☆104Updated last week
- Dettectinator - The Python library to your DeTT&CT YAML files.☆114Updated 3 months ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆285Updated 5 months ago
- ☆92Updated last month
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated 2 weeks ago