joelwking / Phantom-CyberView external linksLinks
Apps for Splunk Phantom security automation | Cisco Meraki | Ansible Tower | F5 | A10
☆24May 29, 2020Updated 5 years ago
Alternatives and similar repositories for Phantom-Cyber
Users that are interested in Phantom-Cyber are comparing it to the libraries listed below
Sorting:
- Phantom Community Playbooks☆529Jan 22, 2026Updated 3 weeks ago
- A collection of awesome resources built for and around the Splunk Phantom platform.☆15Jul 7, 2020Updated 5 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- Files from my Storm Center Articles☆17Jan 17, 2024Updated 2 years ago
- Atomic Red Team App for Phantom☆16Jul 7, 2020Updated 5 years ago
- STIX Visualization Tool☆110Jul 13, 2018Updated 7 years ago
- Automated Use Case Testing☆171May 1, 2018Updated 7 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated last month
- Powershell scripts using CyCLI.☆10May 22, 2019Updated 6 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- A mail reflector written in Python with modules for SPF, DKIM and DMARC authentication, used as a test system for testing correspondent's…☆13Sep 15, 2016Updated 9 years ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 6 years ago
- ☆10Sep 30, 2022Updated 3 years ago
- Additional README's for XSOAR and XSOAR related things☆13Oct 4, 2023Updated 2 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- OpenShift Enterprise Training Manual☆13Apr 8, 2013Updated 12 years ago
- A collection of prompts, templates and slash commands for supercharging Claude Code.☆22Jul 29, 2025Updated 6 months ago
- RndPhrase: Auto-generated secure passwords.☆21May 4, 2016Updated 9 years ago
- ☆12Feb 16, 2024Updated last year
- Rust learning project, built live on Youtube with Ryan Levick☆10Nov 17, 2019Updated 6 years ago
- A Python Pandas implementation of technical indicators and pass all comparison test with the TA-Lib☆10Nov 1, 2019Updated 6 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- This is a DMARC report parser that accepts either an XML or zipped file as input at an attachment via email☆47Jul 30, 2015Updated 10 years ago
- Citrix Apps and Desktop - Session Module☆10May 13, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- GAuthify PHP Client Library - two factor authentication via SMS/Voice/Email/Google Authenticator☆15Oct 27, 2015Updated 10 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Generate Sequelize model definitions from a Swagger 2.0 schema☆11Nov 13, 2020Updated 5 years ago
- osquery input plugin☆10Oct 23, 2018Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- Repo for software related to Software Systems at Olin College.☆12Oct 5, 2015Updated 10 years ago
- ☆13Aug 18, 2023Updated 2 years ago
- active directory ssh pam integration for Azure AD☆11Jan 29, 2017Updated 9 years ago
- ☆13Apr 16, 2025Updated 9 months ago