iforrest / phantom-test-harnessLinks
Test harness for a more pleasurable app building experience
☆14Updated 5 years ago
Alternatives and similar repositories for phantom-test-harness
Users that are interested in phantom-test-harness are comparing it to the libraries listed below
Sorting:
- A collection of awesome resources built for and around the Splunk Phantom platform.☆15Updated 5 years ago
- ☆55Updated 3 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆36Updated 6 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- Powershell Functions to interact with TheHive-Project☆11Updated 6 years ago
- Python API bindings for FireEye Products☆13Updated 4 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 5 years ago
- Python API for the LimaCharlie.io service.☆21Updated last week
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- A Splunk app to use MISP in background☆113Updated last month
- ☆18Updated last year
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 8 years ago
- Sysmon Splunk App☆47Updated 7 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆32Updated 5 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 9 years ago
- automate your MISP installs☆68Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- Simple yara rule manager☆66Updated 3 years ago
- ☆77Updated 6 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- Command line interface to Carbon Black Response☆38Updated 5 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 5 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago
- CrowdStrike Threat Intelligence☆35Updated 3 years ago
- MineMeld nodes for MISP☆19Updated 2 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago