elastic / cortadoLinks
☆10Updated last month
Alternatives and similar repositories for cortado
Users that are interested in cortado are comparing it to the libraries listed below
Sorting:
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated last month
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated last week
- ☆28Updated this week
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Updated 5 years ago
- ☆98Updated 3 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆51Updated 5 months ago
- This repository contains a few examples of actions that can be added to rules within Elastic Security.☆23Updated 8 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆156Updated 7 months ago
- The Sigma command line interface based on pySigma☆161Updated last month
- Dettectinator - The Python library to your DeTT&CT YAML files.☆117Updated 6 months ago
- Detection-as-Code CI/CD pipeline for modern security operations (SIEM, EDR, XDR, ...)☆22Updated 5 months ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- ☆36Updated last month
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago
- List of sigma for a variety of threats for multiple log sources.☆13Updated 6 years ago
- Splunk Content Control Tool☆119Updated this week
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆31Updated 2 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆33Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Updated 3 years ago
- ☆42Updated 3 months ago
- Notes on managing and coordinating the response to major cyber incidents☆41Updated 5 years ago
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆13Updated 2 years ago
- An opensource sigma conversion tool built using pysigma☆141Updated last week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 7 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆163Updated last week
- ☆36Updated 4 months ago
- ☆28Updated 4 years ago