nericksen / xsoar-mdLinks
Additional README's for XSOAR and XSOAR related things
☆12Updated last year
Alternatives and similar repositories for xsoar-md
Users that are interested in xsoar-md are comparing it to the libraries listed below
Sorting:
- Repository for all cbapi example scripts☆16Updated 6 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- Report Generation from the Carbon Black REST API☆15Updated 3 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 4 years ago
- automate your MISP installs☆68Updated 4 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21Updated 3 years ago
- A Splunk app to use MISP in background☆110Updated last week
- Sysmon Splunk App☆47Updated 6 years ago
- ☆23Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 3 years ago
- Zeek package to detect Zerologon☆11Updated 3 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Python module to use the MISP Taxonomies☆29Updated this week
- ☆15Updated 7 years ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated last year
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆87Updated 3 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Updated 9 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- MineMeld nodes for MISP☆19Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago