☆18Sep 13, 2021Updated 4 years ago
Alternatives and similar repositories for Threat-Detection-Maturity-Framework
Users that are interested in Threat-Detection-Maturity-Framework are comparing it to the libraries listed below
Sorting:
- ☆11Feb 9, 2023Updated 3 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- ☆14Jun 20, 2022Updated 3 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Easily create Splunk searches from Python and get the result as a Python object.☆14May 30, 2024Updated last year
- ☆39Jun 28, 2019Updated 6 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- ☆25Jan 4, 2023Updated 3 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆28Oct 23, 2020Updated 5 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 11 months ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Jun 26, 2020Updated 5 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- Python unbup script for McAfee .bup files (with some additional fun features). This script is fully implemented in python it's not just a…☆37Apr 24, 2018Updated 7 years ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- ☆38Mar 2, 2026Updated last week
- Black Hat Python: Python for Pentesters, by EC-Council☆34Jun 20, 2024Updated last year
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Mar 2, 2026Updated last week
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- CrowdStrike Threat Intelligence☆35Jan 14, 2023Updated 3 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- pollen - A command-line tool for interacting with TheHive☆36Jun 6, 2019Updated 6 years ago
- ☆34Nov 16, 2023Updated 2 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- This is a python script that can be run on each Splunk Indexer for the purpose of exporting historical bucket data (raw events + metadata…☆12Jan 31, 2024Updated 2 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- INOFFICIAL nfdump with libnfread: library for reading netflow records from nfdump files☆13Jan 28, 2014Updated 12 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago