reflexsoar / reflex
Reflex SOAR
☆12Updated 2 years ago
Alternatives and similar repositories for reflex:
Users that are interested in reflex are comparing it to the libraries listed below
- ☆42Updated 2 years ago
- ☆4Updated 2 months ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- ☆91Updated 2 years ago
- ☆41Updated 4 years ago
- ☆21Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆77Updated last year
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆75Updated 7 months ago
- ☆51Updated 8 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆104Updated 2 months ago
- ☆53Updated last year
- The PoLRBear Project☆35Updated 3 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆52Updated 2 months ago
- 2021 SANS DFIR Summit: Greppin' Logs☆21Updated 3 years ago
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆12Updated last year
- My Jupyter Notebooks☆36Updated 9 months ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆48Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- ☆14Updated 3 months ago
- ☆77Updated 5 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- ☆33Updated last month
- Conference presentations☆47Updated last year
- ☆32Updated last year
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆122Updated 2 weeks ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 8 months ago