Alir3z4 / ansible-suricataLinks
An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.
☆16Updated 3 years ago
Alternatives and similar repositories for ansible-suricata
Users that are interested in ansible-suricata are comparing it to the libraries listed below
Sorting:
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- setup zeek, previously Bro IDS☆18Updated last week
- MineMeld nodes for MISP☆19Updated last year
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆106Updated last year
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- Coding examples for the OpenDNS Investigate API☆24Updated 5 years ago
- WebUI of MineMeld☆43Updated 2 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 4 years ago
- ☆49Updated last week
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- Integrate Zeek with Alienvault OTX☆25Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- ☆34Updated 4 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Updated 5 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- ☆23Updated 6 years ago
- Run zeek with zeekctl in docker☆55Updated 11 months ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- ☆36Updated 4 years ago
- ☆15Updated 6 years ago
- ☆52Updated 3 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- Documentation used for Shuffle☆19Updated last week