splunk / security_content_docsLinks
Contains research.splunk.com site code
☆11Updated last year
Alternatives and similar repositories for security_content_docs
Users that are interested in security_content_docs are comparing it to the libraries listed below
Sorting:
- Public script from SANS FOR509 Enterprise Cloud Incident Response☆218Updated 3 months ago
- SentinelOne STAR Rules☆71Updated 11 months ago
- Splunk Content Control Tool☆126Updated last week
- RBA is Splunk's method to aggregate low-fidelity security events as interesting observations tagged with security metadata to create high…☆63Updated 3 weeks ago
- Notes on responding to security breaches relating to Azure AD☆120Updated 3 years ago
- A repository of my own Sigma detection rules.☆163Updated 2 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆214Updated 5 years ago
- Repository of SentinelOne Deep Visibility queries.☆135Updated 4 years ago
- MISP to Sentinel integration☆79Updated last month
- ☆99Updated 3 years ago
- A list of Splunk queries that I've collected and used over time.☆90Updated 5 years ago
- Advanced Threat Hunting: Ransomware Group☆29Updated 6 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated last week
- Repository with Sample KQL Query examples for Threat Hunting☆216Updated 3 years ago
- ☆67Updated 2 years ago
- OSSEM Detection Model☆182Updated 3 years ago
- Real-time Response scripts and schema☆122Updated 3 months ago
- This repository contains Splunk queries to hunt some anomalies☆46Updated 3 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆15Updated last month
- An opensource sigma conversion tool built using pysigma☆157Updated 2 weeks ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Updated last year
- A guide to using Azure Data Explorer and KQL for DFIR☆124Updated 3 years ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆277Updated 5 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- MISP to Splunk Enterprise Security Theat Intelligence Framework Integration☆14Updated 2 years ago
- ☆88Updated 10 months ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated 2 years ago
- This repository contains Community and Field contributed content for LogScale☆312Updated last week
- ☆28Updated 2 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Updated 2 years ago