A curated repository of Splunk detection rules, ready to import into Splunk Enterprise or Splunk Cloud. This repo is intended for SOC teams and security engineers to detect common adversary behaviors, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results