splunkalicious / PII_ToolsLinks
☆10Updated 4 years ago
Alternatives and similar repositories for PII_Tools
Users that are interested in PII_Tools are comparing it to the libraries listed below
Sorting:
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- ☆48Updated this week
- OSSEM Common Data Model☆55Updated 2 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 7 years ago
- misp-cloud - Cloud-ready images of MISP☆73Updated 2 years ago
- Wazuh - Splunk App☆55Updated 9 months ago
- Splunk csv to KVStore ES Threat Intel☆11Updated 8 years ago
- A Splunk technology add-on for osquery☆14Updated 4 years ago
- ☆33Updated 3 years ago
- ☆55Updated 3 years ago
- ☆64Updated 4 months ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Documentation used for Shuffle☆19Updated this week
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Web-based sensor management suite☆20Updated 2 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- Install a full Splunk Enterprise Cluster or Universal forwarder using an ansible playbook☆52Updated 5 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- ☆35Updated 4 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last week
- Data Governance app for Splunk☆12Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆82Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago