teamdfir / sift-saltstack
Salt States for Configuring the SIFT Workstation
☆102Updated this week
Alternatives and similar repositories for sift-saltstack:
Users that are interested in sift-saltstack are comparing it to the libraries listed below
- Carbon Black Feeds☆72Updated 2 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- ☆49Updated 4 years ago
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- A Splunk app to use MISP in background☆110Updated last month
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆66Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Volatility plugins developed and maintained by the community☆21Updated 7 months ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆90Updated 7 years ago
- Invoke-LiveResponse☆147Updated 3 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 3 years ago
- Office365 Log Analysis Framework☆82Updated 5 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- A utility repo to assist with converting between MISP and STIX formats☆68Updated 4 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆245Updated 3 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- ☆215Updated last year
- Carbon Black API - Python language bindings☆145Updated 8 months ago
- Powershell Threat Hunting Module☆283Updated 8 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- Tools to automate and/or expedite response.☆114Updated 10 months ago
- Multithreaded threat Intelligence gathering built with Python3☆174Updated 7 years ago