Alir3z4 / ansible-suricataLinks
An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.
☆17Updated 4 years ago
Alternatives and similar repositories for ansible-suricata
Users that are interested in ansible-suricata are comparing it to the libraries listed below
Sorting:
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 5 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- ☆52Updated 3 weeks ago
- setup zeek, previously Bro IDS☆18Updated last week
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- MineMeld nodes for MISP☆19Updated last year
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated this week
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- Tools for Wazuh by Juan C. Tello☆15Updated 3 years ago
- ☆55Updated 3 years ago
- WebUI of MineMeld☆43Updated 2 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆28Updated 5 years ago
- This package allows the use of a custom Elastalert Alert which creates alerts with observables in TheHive using TheHive4Py.☆27Updated 4 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- ☆37Updated 4 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago
- Example configuration files for Logstash☆44Updated 6 years ago
- Run zeek with zeekctl in docker☆56Updated last year
- Integrate Zeek with Alienvault OTX☆25Updated 5 years ago
- Learn about a network from a pcap file or reading from an interface☆29Updated last year
- ☆35Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago