Developer documentation for Resilient APIs
☆25Jan 6, 2025Updated last year
Alternatives and similar repositories for resilient-reference
Users that are interested in resilient-reference are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example scripts and rules for use in Resilient playbooks.☆35Dec 15, 2023Updated 2 years ago
- Python Library for the IBM SOAR REST API, a Python SDK for developing Apps for IBM SOAR and more...☆42Nov 13, 2025Updated 5 months ago
- Source code for IBM SOAR Apps that are available on our App Exchange☆93Feb 20, 2026Updated last month
- Resilient Automation Functions and Scripts☆15Jan 5, 2022Updated 4 years ago
- Playbooks designed for IBM SOAR developed by The IR Gurus. These playbooks can be used to demonstrate how to design playbooks, perform au…☆18May 1, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- These workflows are provided for sample usage, new submissions and updates from the community, and are NOT supported by IBM.☆51Updated this week
- Monitor device events using QRadar☆22Sep 17, 2025Updated 7 months ago
- IBM QRadar Ansible Collection☆25Mar 16, 2026Updated last month
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆262Apr 8, 2026Updated last week
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87May 8, 2025Updated 11 months ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- Log generator☆11Apr 9, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CybOX Tools and Scripts☆44Nov 25, 2013Updated 12 years ago
- Libreoffice extension to convert image to editable document☆18Dec 11, 2016Updated 9 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- A janky, neo4j based CMDB glued together with PowerShell☆17Oct 24, 2019Updated 6 years ago
- IMAP attachment exporter, with optional Thunderbird detach mode☆11Aug 18, 2022Updated 3 years ago
- This repository contain articles from around the web related to application security. It covers resources for Web , mobile and also nativ…☆12Sep 26, 2016Updated 9 years ago
- My old BASH dot-files... Try new one!☆13Aug 17, 2017Updated 8 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated last year
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- What's new in Java 8? A developer focuses short presentation (20 min) created with the awesome reveal.js☆27Nov 8, 2014Updated 11 years ago
- Meta-repository of big data tools -- source and essential plugins for hadoop, pig, wukong, storm, kafka etc.☆30Jun 29, 2014Updated 11 years ago
- An ecosystem to facilitate real-time remote viewing of ultrasound images (or any other livestreaming application)☆11Feb 12, 2023Updated 3 years ago
- ☆13Dec 16, 2019Updated 6 years ago
- An extreme bootcamp to enable teams to build DevSecOps into their environment.☆10Jan 16, 2017Updated 9 years ago
- A Django tutorial jumping between error messages☆17Aug 31, 2014Updated 11 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆35Nov 13, 2025Updated 5 months ago
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- Class notes from courses required for the Advanced Computer Security certificate at Stanford University.☆12Jan 22, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Heimdall Lite 2.0 is a JavaScript based security results viewer and review tool supporting multiple security results formats, such as: In…☆21Feb 11, 2022Updated 4 years ago
- CrawleMe! is is easy way of crawling image or link urls from any web site.☆12Sep 13, 2015Updated 10 years ago
- Port scanner in bash☆16Nov 8, 2013Updated 12 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Discover "HotSpots" - potential spots for credentials theft☆24Apr 12, 2018Updated 8 years ago
- Scripts to automatically import threat intel into QRadar☆14Jun 20, 2019Updated 6 years ago
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago