trendmicro / tm-v1-api-cookbook
Trend Vision One API cookbook sample code
☆12Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for tm-v1-api-cookbook
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆123Updated 9 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆49Updated 2 years ago
- MISP to Sentinel integration☆60Updated last week
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆193Updated 4 years ago
- ☆87Updated 2 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆51Updated last year
- ☆41Updated 2 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆49Updated 3 weeks ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆73Updated 2 weeks ago
- A tool that allows you to document and assess any security automation in your SOC☆43Updated 3 weeks ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆66Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆106Updated 9 months ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆115Updated 4 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆62Updated 6 months ago
- Creating a resource to help build and manage an Insider Threat program.☆62Updated 7 months ago
- InsightVM helpful SQL queries☆59Updated this week
- SIEGMA - Transform Sigma rules into SIEM consumables☆141Updated last year
- OSSEM Detection Model☆168Updated 2 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆109Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆181Updated 2 years ago
- WA Cyber Security Unit (DGOV Technical) site☆29Updated this week
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆57Updated 6 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆104Updated this week
- Blue Team detection lab created with Terraform and Ansible in Azure.☆143Updated this week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆97Updated this week
- Convert Sigma rules to LogRhythm searches☆19Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 6 months ago