Pinned Repositories
attack_data
A repository of curated datasets from various attacks
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
frothlysupply.com
New website for the Frothly merch machine, built by the burnout king Wally Lambic.
playbooks
Phantom Community Playbooks
SA-cim_vladiator
Data validator agains Splunk Common Information Model (CIM)
SA-CrowdstrikeDevices
Allows Crowdstrike device information to be used with Splunk Enterprise Security.
splunk-add-on-microsoft-azure
CIM mapping to vulnerabilities datamodel
attack_data
A repository of curated datasets from various attacks
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
security_content
Splunk Security Content
dluxtron's Repositories
dluxtron/attack_data
A repository of curated datasets from various attacks
dluxtron/attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
dluxtron/frothlysupply.com
New website for the Frothly merch machine, built by the burnout king Wally Lambic.
dluxtron/playbooks
Phantom Community Playbooks
dluxtron/SA-cim_vladiator
Data validator agains Splunk Common Information Model (CIM)
dluxtron/SA-CrowdstrikeDevices
Allows Crowdstrike device information to be used with Splunk Enterprise Security.
dluxtron/splunk-add-on-microsoft-azure
CIM mapping to vulnerabilities datamodel