trellix-enterprise / mvision-edr-activity-feedLinks
A command line tool to consume and subscribe to DXL events from MVISION EDR
☆13Updated 2 years ago
Alternatives and similar repositories for mvision-edr-activity-feed
Users that are interested in mvision-edr-activity-feed are comparing it to the libraries listed below
Sorting:
- Practical Orientation Of MVISION EDR Query Language☆34Updated 2 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆353Updated 4 years ago
- OSSEM Detection Model☆180Updated 3 years ago
- Sigma rules from Joe Security☆225Updated last year
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆141Updated 5 years ago
- ☆128Updated 2 years ago
- Collection of various MVISION EDR Integration Scripts☆32Updated 2 years ago
- Source code for IBM SOAR Apps that are available on our App Exchange☆92Updated 3 weeks ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆157Updated 8 months ago
- PCAP Samples for Different Post Exploitation Techniques☆368Updated 4 years ago
- ☆166Updated 4 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- Log Entry to Sigma Rule Converter☆108Updated 3 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆351Updated 5 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Updated 11 months ago
- ☆131Updated last year
- Convert Sigma rules to Wazuh rules☆73Updated 2 months ago
- CASCADE Server☆273Updated 2 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆174Updated 2 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆413Updated 2 years ago
- A (nearly) production ready Dockered MISP☆231Updated last year
- Converts Sigma detection rules to a Splunk alert configuration.☆114Updated 5 years ago
- ☆124Updated 3 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆287Updated last year
- Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-Cradle…☆307Updated 4 years ago
- ☆133Updated 4 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆36Updated 5 years ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Anything Sysmon related from the MSTIC R&D team☆155Updated last year