elastic / cortadoLinks
☆14Updated last week
Alternatives and similar repositories for cortado
Users that are interested in cortado are comparing it to the libraries listed below
Sorting:
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆54Updated 4 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 11 months ago
- A tool that allows you to document and assess any security automation in your SOC☆49Updated last year
- The Sigma command line interface based on pySigma☆176Updated last month
- Translate an ECS mapping CSV to starter pipelines for Beats, Elasticsearch or Logstash☆54Updated 3 years ago
- Docker image for MISP☆136Updated this week
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Updated 6 years ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆24Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆90Updated 4 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 2 weeks ago
- Convert Sigma rules to Wazuh rules☆73Updated 4 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Updated this week
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- ☆99Updated 3 years ago
- ☆30Updated 4 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated last week
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆122Updated 3 weeks ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆30Updated 2 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- Splunk Content Control Tool☆127Updated this week
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Updated last year
- A collection of tips for using MISP.☆75Updated last year
- Cleanup of older MISP events can require some work until now☆27Updated 4 months ago
- ☆28Updated 2 months ago
- SIEM Logstash parsing for more than hundred technologies☆193Updated 2 weeks ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Updated this week
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago
- ☆128Updated 2 years ago