opencybersecurityalliance / kestrel-jupyterLinks
Kestrel Jupyter Notebook Kernel
☆10Updated 2 years ago
Alternatives and similar repositories for kestrel-jupyter
Users that are interested in kestrel-jupyter are comparing it to the libraries listed below
Sorting:
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Firepit - STIX Columnar Storage☆17Updated last year
- Workflows for Shuffle☆24Updated 3 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Updated 5 years ago
- ☆35Updated 4 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated last year
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- OSSEM Common Data Model☆56Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆21Updated 5 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆37Updated 6 months ago
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- Using QRadar API☆20Updated 7 years ago
- Transform EQL detection rules to VQL artifacts☆12Updated 4 years ago
- ☆120Updated last month
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Updated 6 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆29Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆36Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
- Recon Hunt Queries☆79Updated 4 years ago
- ☆13Updated 3 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago