nextinstall / splunk-dashboardsLinks
A collection of Splunk dashboard templates.
☆15Updated 6 years ago
Alternatives and similar repositories for splunk-dashboards
Users that are interested in splunk-dashboards are comparing it to the libraries listed below
Sorting:
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆224Updated 6 months ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Updated 7 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago
- ☆77Updated last year
- ☆58Updated last year
- ☆86Updated 5 months ago
- LogRhythm PowerShell Toolkit☆51Updated last month
- Real-time Response scripts and schema☆115Updated last year
- A list of Splunk queries that I've collected and used over time.☆85Updated 4 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆23Updated 3 weeks ago
- 2021 SANS DFIR Summit: Greppin' Logs☆20Updated 4 years ago
- MISP to Sentinel integration☆71Updated 3 weeks ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆261Updated 4 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆208Updated 5 years ago
- ☆26Updated 4 years ago
- Incident Response Report Using GitHub-Sphinx☆20Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆227Updated 4 months ago
- ☆64Updated 2 years ago
- Repository of SentinelOne Deep Visibility queries.☆129Updated 4 years ago
- ☆28Updated 4 months ago
- This repository contains Splunk queries to hunt some anomalies☆43Updated 3 years ago
- RBA is Splunk's method to aggregate low-fidelity security events as interesting observations tagged with security metadata to create high…☆56Updated last week
- ☆45Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated 2 weeks ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆44Updated 4 months ago
- ☆15Updated 10 months ago