ibmresilient / resilient-scripts
Example scripts and rules for use in Resilient playbooks.
☆34Updated last year
Alternatives and similar repositories for resilient-scripts:
Users that are interested in resilient-scripts are comparing it to the libraries listed below
- Developer documentation for Resilient APIs☆24Updated 2 months ago
- Source code for IBM SOAR Apps that are available on our App Exchange☆92Updated this week
- Python Library for the IBM SOAR REST API, a Python SDK for developing Apps for IBM SOAR and more...☆41Updated 3 weeks ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated last year
- ☆131Updated last year
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆80Updated 7 months ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- Quick SOC L1 ticket structure☆35Updated 5 years ago
- Cybersecurity Incident Response Plan☆90Updated 4 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- ☆42Updated 4 years ago
- A Splunk app to use MISP in background☆110Updated 3 weeks ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆27Updated 4 years ago
- Dump of organized knowledge on DFIR☆134Updated 3 years ago
- Playbooks designed for IBM SOAR developed by The IR Gurus. These playbooks can be used to demonstrate how to design playbooks, perform au…☆14Updated 11 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated last week
- ☆6Updated 5 months ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- ☆116Updated last year
- ☆77Updated 5 years ago
- Practical Threat Detection Engineering, Published by Packt☆67Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago