Red Canary Carbon Black API
☆20Jan 30, 2016Updated 10 years ago
Alternatives and similar repositories for cbapi2
Users that are interested in cbapi2 are comparing it to the libraries listed below
Sorting:
- Carbon Black API Resources☆93Jan 11, 2018Updated 8 years ago
- Remotely Install the Carbon Black Sensor in Bulk, using PowerShell and PSEXEC, silently, on multiple machines.☆23Jul 17, 2020Updated 5 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Feb 23, 2026Updated 3 weeks ago
- Community Sharing Repository for Carbon Black and Bit9 Platforms☆27Apr 4, 2022Updated 3 years ago
- Subscribe to raw VMware Carbon Black EDR event feed and forward to another system, such as Splunk.☆73Feb 20, 2026Updated last month
- Connector for pulling and converting STIX information from TAXII Service Providers into CB Feeds.☆15Jul 1, 2022Updated 3 years ago
- Carbon Black integration Python utility library☆12Oct 29, 2020Updated 5 years ago
- Carbon Black - Facebook Threat Exchange Connector☆13May 1, 2023Updated 2 years ago
- Command line interface to Carbon Black Response☆38May 12, 2020Updated 5 years ago
- Report Generation from the Carbon Black REST API☆15Mar 24, 2022Updated 3 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- VMware Carbon Black Cloud Python SDK☆45Jun 27, 2025Updated 8 months ago
- Carbon Black SIEM Integration and Automation for LogRhythm☆15Mar 2, 2018Updated 8 years ago
- An IntelliJ plugin for RPM SPEC file support☆12Jul 28, 2025Updated 7 months ago
- A collection of my dotfiles☆10Nov 2, 2018Updated 7 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 4 months ago
- Development repository for the snort cookbook☆27Mar 2, 2026Updated 2 weeks ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Modified edition of cuckoomon☆23Sep 9, 2019Updated 6 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Search pastebin for keywords using python☆33Mar 12, 2012Updated 14 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- GoTel - Scheduled job monitoring☆37Dec 9, 2022Updated 3 years ago
- [DEPRECATED] A quickstart demo for Kolide tools☆52May 29, 2018Updated 7 years ago
- This is a copy of the Registry Decoder repository from Google Code.☆29Aug 18, 2015Updated 10 years ago
- Python bindings to libhtp☆31Oct 13, 2020Updated 5 years ago
- Quick tool for using Hybrid Analysis API on command line..☆17Dec 20, 2017Updated 8 years ago
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 8 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Nov 18, 2017Updated 8 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- IBM QRadar Ansible Collection☆25Updated this week