gf13579 / splunk_app_for_easm
☆10Updated 6 months ago
Alternatives and similar repositories for splunk_app_for_easm:
Users that are interested in splunk_app_for_easm are comparing it to the libraries listed below
- ☆11Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- Slides of my public talks☆55Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆18Updated 6 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- ☆32Updated 4 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 5 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆39Updated 3 weeks ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated 3 weeks ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- ☆12Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Anvilogic Forge☆95Updated this week
- ☆19Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 11 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated last year
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated this week
- ☆35Updated last week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Can you pay the ransom in your country?☆14Updated last year
- ☆41Updated last year
- A collection of various SIEM rules relating to malware family groups.☆66Updated 9 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated 11 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago