phantomcyber / phantom-appsLinks
Phantom Apps Repo
☆83Updated 3 years ago
Alternatives and similar repositories for phantom-apps
Users that are interested in phantom-apps are comparing it to the libraries listed below
Sorting:
- Data validator agains Splunk Common Information Model (CIM)☆76Updated last year
- Risk Based Alerting Supporting Add-On (SA) for Splunk☆45Updated 3 years ago
- A Splunk app to use MISP in background☆110Updated this week
- Splunk code (SPL) for serious threat hunters and detection engineers.☆276Updated last year
- ☆120Updated 3 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- ☆55Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆111Updated 5 years ago
- Splunk Content Control Tool☆114Updated this week
- Sigma Detection Rule Repository☆88Updated 4 years ago
- Visual Studio Code Extension for Splunk☆91Updated 3 weeks ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- ☆131Updated last year
- Splunk Remote Work Insights - Executive Dashboard☆42Updated 4 years ago
- Tools to automate and/or expedite response.☆115Updated 10 months ago
- Collaborative Open Playbook Standard☆156Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 11 months ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- ☆125Updated last year
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Log Entry to Sigma Rule Converter☆108Updated 3 years ago
- TrackMe - Data tracking system for Splunk admins☆50Updated 2 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆12Updated 4 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 3 years ago
- ☆216Updated last year
- Subscribe to raw VMware Carbon Black EDR event feed and forward to another system, such as Splunk.☆73Updated last year
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.