ibmresilient / resilient-scripts
Example scripts and rules for use in Resilient playbooks.
☆34Updated last year
Alternatives and similar repositories for resilient-scripts:
Users that are interested in resilient-scripts are comparing it to the libraries listed below
- Developer documentation for Resilient APIs☆24Updated last month
- Python Library for the IBM SOAR REST API, a Python SDK for developing Apps for IBM SOAR and more...☆41Updated 2 months ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆80Updated 6 months ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆38Updated 2 years ago
- Source code for IBM SOAR Apps that are available on our App Exchange☆91Updated this week
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆33Updated last year
- Quick SOC L1 ticket structure☆35Updated 5 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆52Updated 5 years ago
- ☆131Updated 11 months ago
- ☆42Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- ☆116Updated last year
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆35Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 11 months ago
- Creating a resource to help build and manage an Insider Threat program.☆64Updated 3 weeks ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆76Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆78Updated last year
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- Practical Threat Detection Engineering, Published by Packt☆65Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago