4sConsult / box4securityLinks
Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python Flask web app.
☆16Updated 3 years ago
Alternatives and similar repositories for box4security
Users that are interested in box4security are comparing it to the libraries listed below
Sorting:
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Updated last year
- Wazuh integration TheHive☆41Updated 2 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 3 years ago
- ☆40Updated 2 years ago
- ☆57Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆50Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆35Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Updated 2 months ago
- ☆20Updated 3 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Collection of Dashboards for Threat Hunting and more!☆71Updated 5 years ago
- ☆22Updated 3 years ago
- AIL project training materials☆39Updated 6 months ago
- ☆120Updated 2 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆50Updated 7 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆71Updated 4 years ago
- ☆20Updated 4 years ago
- Run Velociraptor on Security Onion☆40Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated 3 months ago
- Personal scripts☆15Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Website for ail-typo-squatting library☆70Updated 3 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 11 months ago
- A collection of tips for using MISP.☆75Updated last year
- Useful scripts for those administering Wazuh☆91Updated 3 weeks ago
- Technical Tabletop Exercises Simulation Framework☆48Updated 2 years ago
- an awesome list of active defense resources☆128Updated 5 years ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆81Updated 5 months ago