Example scripts for authenticating to the Threat Response APIs
-
Updated
Nov 30, 2018 - Python
Example scripts for authenticating to the Threat Response APIs
How to install Have I been pwned for Cisco's SecureX walk through using Ubuntu 20.04 as the desktop environment
Collection of Suricata rule sets that I use modified to my environments.
Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.
Threat Response Relay Module CLI
Example implemention for using OAuth2 Authorization Code Grant Credentials
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Detection & Hunting.
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Threat Response Serverless Relay for Cyberprotect Threatscore
Threat Response Serverless Relay for Google Safe Browsing
Threat Response Serverless Relay for Gigamon ThreatINSIGHT
Threat Response Serverless Relay for Have I Been Pwned
Threat Response Serverless Relay for SecurityTrails
Add a description, image, and links to the threat-response topic page so that developers can more easily learn about it.
To associate your repository with the threat-response topic, visit your repo's landing page and select "manage topics."