171 private links
Wikiscan is an independent statistics site on Wikipedia and other wikis hosted by the Wikimedia Foundation. The site was created in 2011. The Wikimedia France association supports server hosting.
Wikiscan use public data published by the Wikimedia Foundation : replicas of Wikimedia databases on Tool Labs, pageview dataset, Mediawiki API.
SANS Dashboard:
Network Activity; Offensive IPs; Ports by Unique Sources; Ports by Unique Targets; Ports by Total Activity; StormCast; Diaries; Lastest Vulnerabilities
VirusTotal Intelligence allows you to search through our dataset in order to identify files that match certain criteria (antivirus detections, binary content, metadata, submission file names, file format structural properties, file size, etc.). We could say that it is pretty much like the "Google" of malware.
In order to ease the use of the application we have classified the search queries and modifiers into the following categories, you can combine any number of them in the same query, moreover, you can use AND, OR and NOT operators to tweak your searches.
Like telephone numbers there are directories that relate the IP addresses to names such as "cnn.com". These names are called domain names and the directories are run on servers called Domain Name Servers or DNS. A Reverse DNS Lookup queries these servers in an attempt to find a match.
This video show how to developp a complete application within Qradar using the new Qradar Application Editor
THE TECHNOLOGIES LISTED BELOW were developed within the National Security Agency (NSA) and are now available to the public via Open Source Software (OSS). The NSA Technology Transfer Program (TTP) works with agency innovators who wish to use this collaborative model for transferring their technology to the commercial marketplace. OSS invites cooperative development of technology, encouraging broad use and adoption. The public benefits by adopting, enhancing, adapting, or commercializing the software. The government benefits from the open source community’s enhancements to the technology.
You can record and store security audit events for Windows 10 and Windows Server 2016 to track key system and network activities, monitor potentially harmful behaviors, and mitigate risks. You control the amount of data you collect by controlling the categories of security events you audit, for example, changes to user account and resource permissions, failed attempts to access resources, and attempts to modify system files. The reference in this download can help you decide what to monitor and how to interpret the data you collect.
GOOGLE BIGQUERY
Entrepôt de données rapide, économique et intégralement géré, destiné à l'analyse de données à grande échelle dans les entreprises
Cisco's SenderBase.org provides a view into real-time threat intelligence across web and email. SenderBase is powered by Cisco Talos, the industry-leading threat intelligence organization dedicated to providing protection before, during, and after cybersecurity threats. The data is made up of over 100TB of daily security intelligence across over 1.6 million deployed Web, Email, Firewall and IPS appliances. Talos detects and correlates threats in real time using the largest threat detection network in the world spanning web requests, emails, malware samples, open source data sets, endpoint intelligence, and network intrusions. SenderBase is able transform some of Talos's data into actionable threat intelligence and tools to improve your security posture.
This package contains sample Python code that demonstrates how to use the QRadar REST API. The API is accessed by sending specially crafted HTTP requests to specific URLs on the QRadar console. These URLs, known as "endpoints", each perform a specific function. Some endpoints perform different functions depending on whether you send a GET, POST, or DELETE request. By linking together calls to these endpoints you can implement you own custom business processes or integrate QRadar data with external systems.
IBM X-Force Exchange is a threat intelligence sharing platform enabling research on security threats, aggregation of intelligence, and collaboration with peers.
Browse, Download, Use. qRadar extensions verified for a better security.
The Ariel Query Language (AQL) is a structured query language that you use to communicate with the Ariel databases. Use AQL to query and manipulate event and flow data from the Ariel database.
Directory with qRadar documentation.
Welcome to the IBM® Security QRadar® product documentation, where you can find information about how to install, maintain, and use these products.
Click on a link below to visit the page for each product version.
Below is a list of known issues in RSA Security Analytics 10.6, including those listed in the Release Notes. Please click on the links to go directly to the articles.
The following is an alphabetical list of supported event sources that are available in RSA NetWitness Logs.
Our mission is to be the place to go for collaboration and best practices among customers, partners, and industry experts. We built this resource with your needs in mind, and we hope you return often, contribute, provide feedback, and share your thoughts with us. We are listening.
Our mission is to be the place to go for collaboration and best practices among customers, partners, and industry experts. We built this resource with your needs in mind, and we hope you return often, contribute, provide feedback, and share your thoughts with us. We are listening.