haidermdost / Threat-Detection-Maturity-FrameworkView external linksLinks
☆18Sep 13, 2021Updated 4 years ago
Alternatives and similar repositories for Threat-Detection-Maturity-Framework
Users that are interested in Threat-Detection-Maturity-Framework are comparing it to the libraries listed below
Sorting:
- ☆11Feb 9, 2023Updated 3 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆15Apr 10, 2024Updated last year
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Command line tool for working with Panther rules and policies☆48Feb 9, 2026Updated last week
- Easily create Splunk searches from Python and get the result as a Python object.☆14May 30, 2024Updated last year
- ☆39Jun 28, 2019Updated 6 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆28Oct 23, 2020Updated 5 years ago
- ☆25Jan 4, 2023Updated 3 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Python unbup script for McAfee .bup files (with some additional fun features). This script is fully implemented in python it's not just a…☆37Apr 24, 2018Updated 7 years ago
- A Cribl API wrapper written for Python. Import it into your application to do Cribl things!☆12Mar 20, 2024Updated last year
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆70Sep 13, 2025Updated 5 months ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Black Hat Python: Python for Pentesters, by EC-Council☆32Jun 20, 2024Updated last year
- CrowdStrike Threat Intelligence☆35Jan 14, 2023Updated 3 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- ☆34Nov 16, 2023Updated 2 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 3 years ago
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- Alternative password shadowing scheme☆10Dec 1, 2025Updated 2 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- This is a python script that can be run on each Splunk Indexer for the purpose of exporting historical bucket data (raw events + metadata…☆12Jan 31, 2024Updated 2 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated 3 weeks ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Data about all known supply-chain attacks through history☆63May 28, 2025Updated 8 months ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago