{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"SentinelLogstash","owner":"N4SOC","isFork":false,"description":"A collection of pre-configured containers for Sentinel log ingest using logstash","allTopics":[],"primaryLanguage":{"name":"Dockerfile","color":"#384d54"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-28T11:10:28.830Z"}},{"type":"Public","name":"fortilogcsv","owner":"N4SOC","isFork":false,"description":"Converts Fortigate log exports into CSV","allTopics":["networking","logs","fortigate","fortinet"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":6,"starsCount":40,"forksCount":14,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-17T21:04:10.767Z"}},{"type":"Public","name":"N4Sysmon","owner":"N4SOC","isFork":false,"description":"Node4 customised sysmon config","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-23T11:29:29.863Z"}},{"type":"Public","name":"n4ShadowServer","owner":"N4SOC","isFork":false,"description":"Parser for shadowserver data","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-17T16:49:24.368Z"}},{"type":"Public","name":"auditd","owner":"N4SOC","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-14T10:04:40.828Z"}},{"type":"Public","name":"Azure-Sentinel","owner":"N4SOC","isFork":true,"description":"(Node4 version) Cloud-native SIEM for intelligent security analytics for your entire enterprise.","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2949,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-10T14:51:09.776Z"}},{"type":"Public","name":"demo-scripts","owner":"N4SOC","isFork":false,"description":"Some scripts for triggering SIEM detections in demo environment","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-09T17:49:20.627Z"}},{"type":"Public","name":"SentinelLogicMonitor","owner":"N4SOC","isFork":false,"description":"Sentinel integration for Logic Monitor Audit Logs","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-08-30T12:08:58.923Z"}},{"type":"Public","name":"ThreatIntelContainer","owner":"N4SOC","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-11-25T16:52:23.068Z"}},{"type":"Public","name":"c2-addresses","owner":"N4SOC","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-08-31T14:40:54.859Z"}},{"type":"Public","name":"n4flood","owner":"N4SOC","isFork":false,"description":"Flood monitoring API for PRTG","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-01-27T10:02:13.564Z"}},{"type":"Public","name":"O365-ThreatHunting","owner":"N4SOC","isFork":false,"description":"Powershell scripts for identifying compromised Office 365 accounts/mailboxes","allTopics":["audit","threat-hunting","office365","compromise"],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":1,"issueCount":0,"starsCount":9,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-12-10T03:26:57.668Z"}},{"type":"Public","name":"pyNessus","owner":"N4SOC","isFork":false,"description":"API proxy for Nessus professional to allow aggregated reporting across scans","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-07-14T12:22:14.929Z"}}],"repositoryCount":13,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"N4SOC repositories"}