trellix-enterprise / mvision-edr-activity-feedLinks
A command line tool to consume and subscribe to DXL events from MVISION EDR
☆13Updated last year
Alternatives and similar repositories for mvision-edr-activity-feed
Users that are interested in mvision-edr-activity-feed are comparing it to the libraries listed below
Sorting:
- Practical Orientation Of MVISION EDR Query Language☆33Updated 2 years ago
- Collection of various MVISION EDR Integration Scripts☆32Updated 2 years ago
- A (nearly) production ready Dockered MISP☆232Updated last year
- Phantom Apps Repo☆83Updated 3 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Updated 7 years ago
- OSSEM Detection Model☆176Updated 2 years ago
- Sigma rules from Joe Security☆217Updated 8 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆152Updated 4 months ago
- Home for Splunk security datasets.☆125Updated 5 years ago
- Library of functions to apply Data Science in several forensics artifacts☆39Updated 11 months ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆167Updated last year
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 3 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆285Updated last year
- Repository for SPEED SIEM Use Case Framework☆55Updated 5 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆352Updated 3 years ago
- Phantom Community Playbooks☆505Updated 3 weeks ago
- Converts Sigma detection rules to a Splunk alert configuration.☆111Updated 5 years ago
- Log Entry to Sigma Rule Converter☆108Updated 3 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago
- Sigma Detection Rule Repository☆88Updated 5 years ago
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- A Splunk app to use MISP in background☆110Updated last month
- CASCADE Server☆272Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆201Updated 7 months ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆33Updated 5 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 3 weeks ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- ☆130Updated last year
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 2 years ago
- ☆164Updated 4 years ago