deeso / fleet-deploymentLinks
☆15Updated 6 years ago
Alternatives and similar repositories for fleet-deployment
Users that are interested in fleet-deployment are comparing it to the libraries listed below
Sorting:
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆63Updated 2 years ago
- ☆34Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- automate your MISP installs☆68Updated 5 years ago
- Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model☆11Updated 9 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Updated 6 years ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated last year
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Updated 4 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆40Updated 3 years ago
- ☆13Updated 6 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Recon Hunt Queries☆79Updated 4 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆22Updated 7 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- incident response scripts☆18Updated 6 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 4 months ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆70Updated 2 years ago