splunk / securitydatasetsLinks
Home for Splunk security datasets.
☆128Updated 5 years ago
Alternatives and similar repositories for securitydatasets
Users that are interested in securitydatasets are comparing it to the libraries listed below
Sorting:
- Splunk code (SPL) for serious threat hunters and detection engineers.☆289Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Updated 10 months ago
- ☆99Updated 3 years ago
- OSSEM Detection Model☆184Updated 3 years ago
- A curated list of awesome things related to TheHive & Cortex☆184Updated 4 years ago
- ☆124Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 6 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115Updated 5 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 4 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- Splunk Content Control Tool☆126Updated last week
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆214Updated 5 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆255Updated 10 months ago
- Zeek Log Cheatsheets☆302Updated 5 months ago
- A (nearly) production ready Dockered MISP☆230Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago
- ☆134Updated last year
- Repository for SPEED SIEM Use Case Framework☆58Updated 5 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Phantom Apps Repo☆82Updated 4 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 2 weeks ago
- Resources for SANS CTI Summit 2021 presentation☆104Updated 2 years ago
- Sigma Detection Rule Repository☆92Updated 5 years ago
- ☆128Updated 2 years ago
- Creating a resource to help build and manage an Insider Threat program.☆101Updated last year
- This content is analysis and research of the data sources currently listed in ATT&CK.☆414Updated 2 years ago
- Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆87Updated 8 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Updated last year