☆18Sep 13, 2021Updated 4 years ago
Alternatives and similar repositories for Threat-Detection-Maturity-Framework
Users that are interested in Threat-Detection-Maturity-Framework are comparing it to the libraries listed below
Sorting:
- ☆11Feb 9, 2023Updated 3 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- Easily create Splunk searches from Python and get the result as a Python object.☆14May 30, 2024Updated last year
- ☆39Jun 28, 2019Updated 6 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆28Oct 23, 2020Updated 5 years ago
- ☆25Jan 4, 2023Updated 3 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 10 months ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- A Cribl API wrapper written for Python. Import it into your application to do Cribl things!☆12Mar 20, 2024Updated last year
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Updated this week
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- ☆34Nov 16, 2023Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- This is a python script that can be run on each Splunk Indexer for the purpose of exporting historical bucket data (raw events + metadata…☆12Jan 31, 2024Updated 2 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 3 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week