Investigating attacks using Splunk Enterprise logs and creating SPL intrusion detection searches based on known attacker TTPs and anomaly behavior derived from statistical baselines
☆29Nov 19, 2023Updated 2 years ago
Alternatives and similar repositories for splunk-logs-and-investigations
Users that are interested in splunk-logs-and-investigations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Splunking Tools, SPL Code and Resources☆15Jan 30, 2025Updated last year
- This repository is dedicated to hosting personal comprehensive walkthrough solutions for Splunk's Boss of the SOC (BOTS) CTF-style labs. …☆16Dec 30, 2023Updated 2 years ago
- ☆16Mar 10, 2026Updated last month
- ☆37May 13, 2020Updated 5 years ago
- Run Splunk heavy forwarders in Docker Swarm for high availability, security, and reduced cost!☆15Aug 19, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆18Jul 3, 2018Updated 7 years ago
- Links to VeteranSec Resources☆12May 18, 2020Updated 5 years ago
- Transform any binary file to a PNG image☆13Jul 19, 2019Updated 6 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- This repository contains Splunk queries to hunt some anomalies☆47Jul 28, 2022Updated 3 years ago
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- gnuplot ported for android☆19Jan 11, 2018Updated 8 years ago
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆15May 18, 2023Updated 2 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆42Apr 13, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 6 months ago
- SANS #CTI Summit 2025☆13Jan 28, 2025Updated last year
- ☆11Jul 10, 2022Updated 3 years ago
- Ultimate Cybersecurity Roadmap (2025 Edition) | Beginner to Advanced Guide | Learn Ethical Hacking, SOC Analysis, Threat Hunting, Inciden…☆59Jul 7, 2025Updated 9 months ago
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆13Mar 24, 2026Updated last month
- ☆27Jan 19, 2021Updated 5 years ago
- Code for the paper "Fuzzy c-Means Clustering for Persistence Diagrams"☆14Oct 14, 2023Updated 2 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- This code is to implement the model-free control algorithm as introduced in the paper Model-free control by Michel Fliess and Cedric Join…☆13Nov 29, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- https://marsvillager.github.io/PaperWorkflowAutomation/summary/visualize.html (Safari, Firefox ✓ Edge, Chrome ✗) 论文爬虫+概述: IEEE Symposium …☆13Oct 1, 2025Updated 6 months ago
- Large-scale Data Classification based on the Integrated Fusion of Fuzzy Learning and Graph Neural Network☆13Nov 2, 2023Updated 2 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- Ecg experiment, including Fourier transform, wavelet transform, wavelet decomposition and LSTM feature extraction. Emotion classification…☆11Jul 17, 2020Updated 5 years ago
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- ExchangeHound is a defensive BloodHound OpenGraph collector for on-prem Microsoft Exchange that maps mailbox delegation and Exchange priv…☆62Apr 17, 2026Updated last week
- A Python implementation of improved Label Propagation Algorithm.☆11May 26, 2021Updated 4 years ago
- [DEPRECIATED] All writeups are moved to my main website☆14Mar 15, 2024Updated 2 years ago
- ☆12Apr 7, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- NetHawk is your network security analysis tool that provides features and alerts via Discord when network attacks occur with score report…☆15Sep 8, 2025Updated 7 months ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 9 years ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆768Aug 28, 2025Updated 8 months ago
- Scripted inputs designed to address common use-cases in forwarder misconfigurations in a Splunk deployment☆35Aug 29, 2024Updated last year
- ☆11May 1, 2024Updated last year
- Source codes of "Fast Continuous Subgraph Matching over Streaming Graphs via Backtracking Reduction", SIGMOD 2023☆14Sep 7, 2023Updated 2 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago