hire-vladimir / data_governanceLinks
Data Governance app for Splunk
☆12Updated last year
Alternatives and similar repositories for data_governance
Users that are interested in data_governance are comparing it to the libraries listed below
Sorting:
- Allows for MAC address to vendor mapping in Splunk☆16Updated last year
- Splunk csv to KVStore ES Threat Intel☆11Updated 8 years ago
- A homebrewed cyber threat intelligence solution☆20Updated 12 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 5 months ago
- ☆55Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Monitor syslog collection infrastructure & offer syslog configuration templates.☆24Updated 7 years ago
- ☆10Updated 4 years ago
- Data validator agains Splunk Common Information Model (CIM)☆76Updated last year
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated last week
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Bringing DevOps to Forensics☆34Updated 10 years ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated last year
- Python module to use the MISP Taxonomies☆29Updated last week
- A tool to convert MISP XML files (events and attributes) into graphs☆20Updated 8 years ago
- Zeek support for Community ID flow hashing.☆35Updated last year
- Files from my Storm Center Articles☆17Updated last year
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last week
- ☆28Updated 8 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- JSON Tools Technology Add-On for Splunk☆10Updated 4 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Example Splunk Alert Scripts☆20Updated 10 years ago
- A curated list of awesome Splunk links☆40Updated 9 years ago
- ☆13Updated 7 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Updated 11 years ago