daveherrald / TA-cyberchefLinks
A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.
☆13Updated 7 years ago
Alternatives and similar repositories for TA-cyberchef
Users that are interested in TA-cyberchef are comparing it to the libraries listed below
Sorting:
- ☆55Updated 3 years ago
- InvestigationPlaybookSpec☆71Updated 8 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- ☆50Updated 5 years ago
- CRITs - Collaborative Research Into Threats☆21Updated 6 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 5 years ago
- ☆36Updated 9 years ago
- Collecting & Hunting for IOCs with gusto and style☆117Updated 7 years ago
- Carbonblack Live Response from the comfort of your own terminal☆20Updated 9 years ago
- Carbon Black Feeds☆73Updated 2 years ago
- Add-on for ingesting DMARC aggregate reports into Splunk☆15Updated 3 years ago
- ☆48Updated 9 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆189Updated last year
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 9 years ago
- Sysmon Splunk App☆47Updated 7 years ago
- ☆73Updated 8 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Updated 6 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Updated 9 years ago
- ☆194Updated last year
- CB API scripts for IR, administration, etc.☆32Updated 6 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆92Updated 8 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆67Updated 7 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago
- Carbon Black API Resources☆93Updated 8 years ago
- Splunk Boss of the SOC v1 data set.☆113Updated 7 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆51Updated 7 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago