☆10Sep 12, 2024Updated last year
Alternatives and similar repositories for splunk_app_for_easm
Users that are interested in splunk_app_for_easm are comparing it to the libraries listed below
Sorting:
- ☆12Feb 15, 2024Updated 2 years ago
- MCP use case for SecOps automation w/ Splunk,CrowdStrike EDR, MISP☆21Jul 7, 2025Updated 7 months ago
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆10Feb 25, 2021Updated 5 years ago
- Professional RAG development skills for Claude Code - audit, evaluate, optimize, and scaffold RAG pipelines☆24Jan 18, 2026Updated last month
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Backup solution with only bash and rsync, for incremental full backups☆11Feb 23, 2025Updated last year
- Rsources that are publicly available, these resources are linked to the SANS SEC598 Class☆21Feb 2, 2026Updated 3 weeks ago
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated 11 months ago
- Documentation for connecting Microsoft Sentinel and the ACSC CTIS platform☆10Jan 23, 2024Updated 2 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- SIEM Visibility assessment☆14May 22, 2023Updated 2 years ago
- Overlook is a MacOS-native remote console for GL.iNet GLKVM / Comet-style KVM devices.☆27Jan 20, 2026Updated last month
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- Lists compiled by the ARC community to help with adoption☆13Jul 27, 2023Updated 2 years ago
- Recordization library☆11Feb 17, 2026Updated last week
- Splunk Add-on for Microsoft Azure☆11Dec 15, 2025Updated 2 months ago
- a graph definition and execution library for python☆16Mar 22, 2023Updated 2 years ago
- Strengthen your defense against web attacks with Kali Linux and Metasploit☆13Jan 30, 2023Updated 3 years ago
- Reworked assets for Azure Sentinel using Cisco Umbrella logs as source. Includes logstash config for Cisco Umbrella using Cisco managed A…☆13Apr 14, 2020Updated 5 years ago
- Decentralized DNS fuzzer to mitigate ISP Snooping☆13May 3, 2017Updated 8 years ago
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆12Dec 4, 2024Updated last year
- ☆15Feb 12, 2023Updated 3 years ago
- A collection of chicken photos. Useful for training computer vision models to identify chickens.☆12Oct 6, 2017Updated 8 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- Various Topics☆18Apr 30, 2025Updated 9 months ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- ☆16Jan 15, 2026Updated last month
- ☆10Jun 14, 2016Updated 9 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Siyazana is an isiZulu word that means we know each other or we are connected. This website has been designed to provide users with a too…☆15Sep 22, 2018Updated 7 years ago
- Home Assistant integration to monitor and control Omlet Smart Coop Door☆19Jan 21, 2026Updated last month
- ☆13Feb 18, 2026Updated last week
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- glassdoor is a modern, autonomous security framework for Android APKs. POC, unmaintained unfortunately.☆14Jul 28, 2017Updated 8 years ago
- ☆14Oct 14, 2025Updated 4 months ago
- Aussie Broadband API Python module☆13Updated this week
- ☆12Jul 15, 2022Updated 3 years ago
- ☆16Aug 10, 2025Updated 6 months ago