trendmicro / tm-v1-api-cookbook
Trend Vision One API cookbook sample code
☆12Updated last month
Alternatives and similar repositories for tm-v1-api-cookbook:
Users that are interested in tm-v1-api-cookbook are comparing it to the libraries listed below
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆133Updated 2 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆160Updated 2 weeks ago
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆39Updated this week
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- ☆93Updated 2 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆250Updated 2 months ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆200Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Threat Analytics Search Chrome Extension☆12Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- ☆42Updated 2 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Active Directory Purple Team Playbook☆107Updated last year
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆110Updated 2 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 7 months ago
- Rules generated from our investigations.☆194Updated 2 weeks ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆184Updated 2 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated 6 months ago
- Web based S1 query navigator for one-click threat hunting☆18Updated 4 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆186Updated 9 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆70Updated 11 months ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆75Updated last week
- MISP to Sentinel integration☆64Updated last week