georgestarcher / Splunk-ESIntel-KVStore
Splunk csv to KVStore ES Threat Intel
☆11Updated 8 years ago
Alternatives and similar repositories for Splunk-ESIntel-KVStore:
Users that are interested in Splunk-ESIntel-KVStore are comparing it to the libraries listed below
- ☆55Updated 3 years ago
- scripts to configure the Splunk Universal Forwarder in a locked down state☆40Updated 6 years ago
- Allows for MAC address to vendor mapping in Splunk☆16Updated last year
- Report Generation from the Carbon Black REST API☆15Updated 3 years ago
- Sysmon Splunk App☆46Updated 6 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Updated 9 years ago
- ☆49Updated 4 years ago
- Example Splunk Alert Scripts☆20Updated 10 years ago
- Risk Based Alerting Supporting Add-On (SA) for Splunk☆45Updated 3 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- Python library for the ArcSight logger REST API☆27Updated 3 years ago
- Carbon Black Feeds☆72Updated 2 years ago
- Bringing DevOps to Forensics☆34Updated 10 years ago
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- Python script to pull various IOCs from PDFs☆15Updated 10 years ago
- Community Sharing Repository for Carbon Black and Bit9 Platforms☆27Updated 3 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Volatility plugins developed and maintained by the community☆21Updated 6 months ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆68Updated 3 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Updated 8 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Updated 11 years ago
- Add-on for ingesting DMARC aggregate reports into Splunk☆15Updated 2 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 6 years ago
- FRAC and RIFT☆17Updated 6 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆37Updated 2 years ago