PowerShell module for SentinelOne API
-
Updated
Mar 8, 2021 - PowerShell
PowerShell module for SentinelOne API
Sniffing out well-known threat groups
This collection provides several unofficial ansible modules and roles to use with SentinelOne management consoles
PowerShell wrapper for the SentinelOne API
This project shows a graphical view of the process executions relationship in a tree format (HTML version)
Installs and configures the SentinelONE client
Docker-based Scalyr (SentinelOne) agent for macOS (Intel & Apple Silicon). Ships host logs by default, easily extended for Docker JSON logs.
Allows SentinelOne device information to be used with Splunk Enterprise Security.
Monitoring plugin (Icinga/Nagios compatible) to check the presence of threats on the SentinelOne Cloud service
Scripts played by GitHub Actions that converts Sigma rules to SentinelOne PowerQuery via PySigma.
🚀 SentinelOne AddEvents API Tester Easily send test log events to SentinelOne's addEvents API—without installing an agent. Ideal for POC/POV testing, this Zsh script randomizes event data, supports both 1Password & traditional .env authentication, and helps validate S1 Collector ingestion before deployment.
Log Volume Calculator (WIP)
Add a description, image, and links to the sentinelone topic page so that developers can more easily learn about it.
To associate your repository with the sentinelone topic, visit your repo's landing page and select "manage topics."