sublime-security / sublime-cli
A command-line tool and module for the free Sublime Analysis API
☆12Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for sublime-cli
- ☆1Updated 2 weeks ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆50Updated 2 weeks ago
- Python library for threat intelligence☆79Updated 4 months ago
- ☆41Updated 3 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆33Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Recon Hunt Queries☆75Updated 3 years ago
- Sigma Detection Rule Repository☆85Updated 4 years ago
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆106Updated 8 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- ☆31Updated 3 weeks ago
- ☆41Updated 2 years ago
- ☆84Updated 8 months ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- A Splunk app to use MISP in background☆109Updated 2 weeks ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- Public Landing Page☆16Updated last year
- My Jupyter Notebooks☆36Updated 7 months ago
- An open source platform to support analysts to organise their case and tasks☆55Updated 2 weeks ago
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆78Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆97Updated 8 months ago
- ☆32Updated 11 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆77Updated 10 months ago