splunk / securitydatasetsLinks
Home for Splunk security datasets.
☆126Updated 5 years ago
Alternatives and similar repositories for securitydatasets
Users that are interested in securitydatasets are comparing it to the libraries listed below
Sorting:
- Splunk code (SPL) for serious threat hunters and detection engineers.☆287Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 8 months ago
- OSSEM Detection Model☆180Updated 3 years ago
- ☆98Updated 3 years ago
- This is a repository for freq.py and freq_server.py☆211Updated 5 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆214Updated 5 years ago
- Splunk Content Control Tool☆123Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆114Updated 5 years ago
- ☆124Updated 3 years ago
- ☆133Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆118Updated 7 months ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 2 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆244Updated 8 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆140Updated last year
- Creating a resource to help build and manage an Insider Threat program.☆101Updated 10 months ago
- This repository contains Splunk queries to hunt some anomalies☆44Updated 3 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆86Updated 6 months ago
- Detection Ideas & Rules repository.☆179Updated 4 years ago
- A curated list of awesome things related to TheHive & Cortex☆182Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Updated 2 years ago
- Zeek Log Cheatsheets☆298Updated 3 months ago
- Threat Hunting & Incident Investigation with Osquery☆217Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆204Updated 11 months ago
- RBA is Splunk's method to aggregate low-fidelity security events as interesting observations tagged with security metadata to create high…☆61Updated last week
- ☆127Updated 2 years ago
- A (nearly) production ready Dockered MISP☆231Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- Convert Sigma rules to LogRhythm searches☆22Updated 3 years ago