georgestarcher / Splunk-ESIntel-KVStore
Splunk csv to KVStore ES Threat Intel
☆10Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for Splunk-ESIntel-KVStore
- ☆55Updated 2 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Updated 9 years ago
- Python script to pull various IOCs from PDFs☆15Updated 9 years ago
- Threat Intelligence distribution☆30Updated 8 years ago
- Sysmon Splunk App☆46Updated 6 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Updated 8 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- ☆48Updated 4 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆28Updated 9 years ago
- Bro Intel Feed Linter☆26Updated 5 years ago
- ☆17Updated 7 years ago
- Python library for the ArcSight logger REST API☆27Updated 3 years ago
- A collection of bro_scripts and signatures☆26Updated 5 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 7 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 7 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- ☆38Updated 6 years ago
- CRITs IOC Visualization in Maltego☆28Updated 9 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated 2 months ago
- A set of templates for documenting threat intelligence☆73Updated 11 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- pan-stix☆19Updated 7 years ago