Command line interface to Carbon Black Response
☆38May 12, 2020Updated 5 years ago
Alternatives and similar repositories for cbrcli
Users that are interested in cbrcli are comparing it to the libraries listed below
Sorting:
- CB API scripts for IR, administration, etc.☆32Jun 3, 2019Updated 6 years ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago
- Repository for all cbapi example scripts☆16Sep 18, 2018Updated 7 years ago
- Carbon Black API - Python language bindings☆145Aug 22, 2024Updated last year
- Carbonblack Live Response from the comfort of your own terminal☆20Jan 20, 2016Updated 10 years ago
- Red Canary Carbon Black API☆20Jan 30, 2016Updated 10 years ago
- ☆39Jun 28, 2019Updated 6 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆86Oct 23, 2020Updated 5 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- Carbon Black API Resources☆93Jan 11, 2018Updated 8 years ago
- Remotely Install the Carbon Black Sensor in Bulk, using PowerShell and PSEXEC, silently, on multiple machines.☆23Jul 17, 2020Updated 5 years ago
- Javascript deobfuscation tool☆17Apr 6, 2018Updated 7 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- ☆17Jan 22, 2026Updated last month
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- Maltese - Malware Traffic Emulator☆26Feb 15, 2017Updated 9 years ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆240Jul 22, 2021Updated 4 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆260Mar 31, 2025Updated 11 months ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- Multithreaded threat Intelligence gathering built with Python3☆177Jan 23, 2018Updated 8 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Feb 23, 2026Updated 3 weeks ago
- Syslog Connector for the Carbon Black Cloud☆30Sep 27, 2024Updated last year
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Detecting ATT&CK techniques & tactics for Linux☆257Oct 1, 2020Updated 5 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Nov 18, 2017Updated 8 years ago
- Import Mitre Att&ck into Neo4j database☆39Mar 5, 2026Updated 2 weeks ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Python Module for creating Log Event Extended Format events for IBM QRadar☆12Jun 4, 2016Updated 9 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆168Dec 10, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/checkout4mac☆13Oct 24, 2016Updated 9 years ago
- misp-cloud - Cloud-ready images of MISP☆74Aug 24, 2022Updated 3 years ago
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago