<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>splunk</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/1390/feed"/>
    <updated>2026-05-12T21:20:10+00:00</updated>
    <id>https://links.biapy.com/guest/tags/1390/feed</id>
            <entry>
            <id>https://links.biapy.com/links/10626</id>
            <title type="text"><![CDATA[Automated Splunk Detection &amp;amp; Response Lab]]></title>
            <link rel="alternate" href="https://github.com/thekibiru03/splunk-ad-lab" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10626"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[This project automates the creation of a complete security lab environment for detection engineering and attack simulation. With a single command, it deploys three virtual machines: a fully configured Splunk server, a Windows Server Active Directory Domain Controller with advanced logging, and a Splunk SOAR server for automated response capabilities.]]>
            </summary>
            <updated>2025-10-10T13:36:49+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/10327</id>
            <title type="text"><![CDATA[DetectPack Forge]]></title>
            <link rel="alternate" href="https://detect-pack-forge.vercel.app/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10327"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Turn ideas into detections your SIEM understands. Generate Sigma, KQL, and SPL rules with tests and playbooks in seconds.

 DetectPack Forge turns plain-English behaviors or sample logs into production-ready detection packs — Sigma, KQL (Sentinel), SPL (Splunk) — plus tests and a response playbook, mapped to MITRE ATT&amp;amp;CK, fully powered by Gen AI. 

- [DetectPack Forge @ GitHub](https://github.com/andrewkolagit/DetectPack-Forge).]]>
            </summary>
            <updated>2025-09-22T05:28:45+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2107</id>
            <title type="text"><![CDATA[ARM - AttackRuleMap]]></title>
            <link rel="alternate" href="https://attackrulemap.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2107"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Mapping of open-source detection rules and atomic tests. 

The goal of this project is to bridge the gap between Atomic Red Team&amp;#039;s adversary simulations and open-source detection rules. By doing so, this project aims to help security professionals simulate attacks and evaluate their detection strategies more effectively. 🔒

- [AttackRuleMap @ GitHub](https://github.com/krdmnbrk/AttackRuleMap).]]>
            </summary>
            <updated>2025-08-28T21:48:25+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4363</id>
            <title type="text"><![CDATA[Tracecat -]]></title>
            <link rel="alternate" href="https://tracecat.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4363"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open source alternative to Tines / Palo Alto XSOAR. Automate security alerts, your way.

Tracecat is an open source Tines / Splunk SOAR alternative. Build AI-assisted workflows, orchestrate alerts, and close cases fast.

SOAR (Security Orchestration, Automation and Response) refers to technologies that enable organizations to automatically collect and respond to alerts across different tooling. Though Tracecat is built for security, it&amp;#039;s workflow automation and case management system can be applied to other alerting environments (e.g. site reliability engineering, DevOps, and physical systems monitoring).

- [Tracecat @ GitHub](https://github.com/TracecatHQ/tracecat).
- [Tracecat – L’alternative open source à Tines / Splunk SOAR pour automatiser la sécu @ Korben :fr:](https://korben.info/tracecat-alternative-open-source-tines-splunk-soar-automatisation-secu.html).]]>
            </summary>
            <updated>2025-08-29T04:04:21+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/6023</id>
            <title type="text"><![CDATA[Vector]]></title>
            <link rel="alternate" href="https://vector.dev/" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/6023"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A lightweight, ultra-fast tool for building observability pipelines.

- [Vector @ GitHub](https://github.com/vectordotdev/vector).

Related contents:

- [Connaissez-vous Vector @ Xavier Pestel&amp;#039;s LinkedIn :fr:](https://www.linkedin.com/posts/xavier-pestel_opensource-observabilitaez-linux-activity-7132605126703214592-h5uz).
- [Keeping Secrets Out of Logs @ allan.reyes.sh](https://allan.reyes.sh/posts/keeping-secrets-out-of-logs/).
- [From Millions to Billions @ geocodio](https://www.geocod.io/code-and-coordinates/2025-10-02-from-millions-to-billions/).]]>
            </summary>
            <updated>2025-10-14T12:21:49+00:00</updated>
        </entry>
    </feed>
