Alir3z4 / ansible-suricata
An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.
☆15Updated 3 years ago
Alternatives and similar repositories for ansible-suricata:
Users that are interested in ansible-suricata are comparing it to the libraries listed below
- setup zeek, previously Bro IDS☆18Updated 2 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 months ago
- ☆12Updated 5 years ago
- ☆15Updated 5 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 3 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- This repository is created to add value to existing Network Security Monitoring solutions.☆16Updated 8 years ago
- Example Suricata rules implementing some of my detection tactics☆20Updated 2 years ago
- ☆34Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- ☆33Updated 3 years ago
- ☆24Updated 5 years ago
- ☆34Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- A website and framework for testing NIDS detection☆57Updated 3 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Updated last year
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆28Updated 7 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 5 years ago
- Triage automation for suspect URLs☆12Updated 5 years ago
- ☆12Updated 7 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated last year