ebarti / cortex-xdr-clientLinks
A python-based API client for Cortex XDR API.
☆26Updated 2 weeks ago
Alternatives and similar repositories for cortex-xdr-client
Users that are interested in cortex-xdr-client are comparing it to the libraries listed below
Sorting:
- Threat Hunting queries for various attacks☆238Updated this week
- Protect your Domain Controllers by auditing and restricting LDAP requests☆170Updated 2 months ago
- ☆13Updated 2 years ago
- ☆160Updated last year
- ☆547Updated last year
- Evtx to Splunk ingestor☆15Updated 3 years ago
- OSSEM Detection Model☆176Updated 2 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 2 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated last month
- Sublime rules for email attack detection, prevention, and threat hunting.☆316Updated this week
- Anything Sysmon related from the MSTIC R&D team☆155Updated last year
- ☆43Updated 2 years ago
- Automatically created C2 Feeds☆632Updated this week
- Ransomware simulator written in Golang☆443Updated 3 years ago
- ATT&CK Evaluations Library☆72Updated 2 weeks ago
- yara detection rules for hunting with the threathunting-keywords project☆126Updated 3 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆105Updated 11 months ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆92Updated last month
- Audit program for AzureAD☆150Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆318Updated 3 months ago
- A MITRE Caldera plugin☆45Updated 8 months ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆373Updated 6 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆204Updated 3 years ago
- Sigma rules to share with the community☆121Updated 6 months ago
- LOKI2 - Simple IOC and YARA Scanner☆98Updated last month
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 3 years ago
- Active C&C Detector☆155Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆66Updated last year
- Incident Response - Fast suspicious file finder☆245Updated 3 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆154Updated 3 years ago