Splunk csv to KVStore ES Threat Intel
☆11Jul 11, 2016Updated 9 years ago
Alternatives and similar repositories for Splunk-ESIntel-KVStore
Users that are interested in Splunk-ESIntel-KVStore are comparing it to the libraries listed below
Sorting:
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Splunk TA to provide both modular inputs and a modular alert for synchronizing KVStore content across Splunk Instances.☆14Jul 9, 2020Updated 5 years ago
- ☆15Apr 28, 2017Updated 8 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Cloudwatch Logs Transform for Firehose: formats into Splunk HEC Event☆18Apr 5, 2024Updated last year
- ☆16Dec 26, 2022Updated 3 years ago
- Look into EDR events from network☆25Nov 20, 2025Updated 3 months ago
- Python class to submit events to Splunk HTTP Event Collector☆96Apr 17, 2024Updated last year
- Install and configure user mode auditd tools☆34Feb 17, 2026Updated 2 weeks ago
- Translate STIX 2 Patterning Queries☆31Oct 4, 2018Updated 7 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- A SSH Server in Go that logs username/password combos☆39Updated this week
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- Azure Functions for getting data in to Splunk☆33Oct 22, 2025Updated 4 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆86May 22, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Splunk app to monitor the /etc directory of Splunk for all changes of .conf files☆13Jan 26, 2018Updated 8 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Zeek support for Community ID flow hashing.☆36Jul 11, 2023Updated 2 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Blazing fast, modular, next gen logagent☆11Feb 24, 2026Updated last week
- GPG key integration for Blockstack client applications☆10Aug 1, 2017Updated 8 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Windows Batch script to install and setup the Splunk Universal Forwarder☆11Feb 24, 2020Updated 6 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Jul 10, 2025Updated 7 months ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 7 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- ☆10May 6, 2023Updated 2 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago