splunk / botsv1
☆391Updated 9 months ago
Alternatives and similar repositories for botsv1:
Users that are interested in botsv1 are comparing it to the libraries listed below
- Splunk Boss of the SOC version 2 dataset.☆380Updated 2 years ago
- Splunk Boss of the SOC version 3 dataset.☆335Updated 4 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆276Updated last year
- ☆119Updated 3 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆409Updated last year
- A set of Zeek scripts to detect ATT&CK techniques.☆587Updated 10 months ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆585Updated last year
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆448Updated 3 years ago
- A repository of curated datasets from various attacks☆646Updated this week
- Phantom Community Playbooks☆498Updated 3 months ago
- User guide of MISP☆267Updated 4 months ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆352Updated 4 years ago
- CASCADE Server☆269Updated 2 years ago
- MISP trainings, threat intel and information sharing training materials with source code☆407Updated this week
- Home for Splunk security datasets.☆125Updated 5 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,156Updated last year
- Consolidation of various resources related to Microsoft Sysmon & sample data/log☆109Updated 3 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆565Updated 4 months ago
- Actionable analytics designed to combat threats☆982Updated 2 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆556Updated 3 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆245Updated 3 years ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆357Updated 3 months ago
- Sigma rules from Joe Security☆209Updated 6 months ago
- Cyber Analytics Repository☆934Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆566Updated 3 months ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆206Updated 4 years ago
- A collection of resources for Threat Hunters☆881Updated 6 months ago
- A framework for developing alerting and detection strategies for incident response.☆736Updated 3 years ago
- A (nearly) production ready Dockered MISP☆231Updated last year
- Documentation of TheHive☆397Updated last year