opendxl / opendxl-consoleLinks
OpenDXL Console is a high-level web-based console for interacting with a DXL fabric
☆11Updated 4 years ago
Alternatives and similar repositories for opendxl-console
Users that are interested in opendxl-console are comparing it to the libraries listed below
Sorting:
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Updated 4 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Node.js SDK for IBM X-Force Exchange☆15Updated 7 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Updated 11 years ago
- ☆11Updated 8 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Falcon Integration Gateway (FIG)☆21Updated this week
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated last year
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- Using QRadar API☆20Updated 7 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆22Updated 7 years ago
- Example Suricata rules implementing some of my detection tactics☆21Updated 2 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 8 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- DefectDojo Documentation☆17Updated 4 years ago
- Best practices in threat intelligence☆48Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Tools to assist in forensicating docker☆84Updated 7 months ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 5 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- ☆34Updated 4 years ago