splunk / security_content_docs
Contains research.splunk.com site code
☆11Updated 11 months ago
Alternatives and similar repositories for security_content_docs:
Users that are interested in security_content_docs are comparing it to the libraries listed below
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆90Updated last month
- This repository contains Splunk queries to hunt some anomalies☆40Updated 2 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 11 months ago
- ☆18Updated 2 years ago
- Convert Sigma rules to LogRhythm searches☆20Updated 3 years ago
- ☆57Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆36Updated last week
- SentinelOne STAR Rules☆58Updated last month
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆89Updated 4 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Updated 7 years ago
- ☆26Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Splunk Content Control Tool☆108Updated this week
- SPL cheatsheet for Splunk.☆21Updated 2 years ago
- ☆72Updated 5 months ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- A repository of my own Sigma detection rules.☆157Updated 6 months ago
- This will be a repository of SentinelOne Deep Visibility queries both the Standard Queries and the Power Queries. Most of these queries w…☆25Updated 5 months ago
- Full of public notes and Utilities☆98Updated last month
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Knowing which rule should trigger according to the redcannary test☆11Updated 4 months ago
- Notes on responding to security breaches relating to Azure AD☆109Updated 3 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated last year
- ☆14Updated last month
- Repository of public reference frameworks for the DFIR community.☆115Updated last year
- Repository of SentinelOne Deep Visibility queries.☆125Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Web based S1 query navigator for one-click threat hunting☆18Updated 4 years ago