YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack
☆16Jan 6, 2021Updated 5 years ago
Alternatives and similar repositories for YetiToElastic
Users that are interested in YetiToElastic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WebUI of MineMeld☆42Mar 16, 2023Updated 3 years ago
- Malware management program and tools☆28Dec 16, 2015Updated 10 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Jun 11, 2020Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- Prototypes for MineMeld nodes☆38Oct 15, 2021Updated 4 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- ☆12Jan 28, 2020Updated 6 years ago
- ida python scripts☆23Jul 23, 2018Updated 7 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Windows file metadata / forensic tool.☆19Oct 12, 2025Updated 5 months ago
- A solution for using the ElastiFlow Unified Collector with the Elastic Stack (Elasticsearch and Kibana).☆26Nov 10, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 8 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆70Nov 11, 2023Updated 2 years ago
- Cert Michelin Awareness Card Game repository☆15Dec 10, 2017Updated 8 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆243Mar 14, 2026Updated 3 weeks ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Combining OSINT sources in Elastic Stack☆78Oct 10, 2020Updated 5 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Mar 19, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆15Oct 16, 2020Updated 5 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- A decryptor for systems infected by Avaddon ransomware.☆25Oct 29, 2024Updated last year
- Scripts and integrations for OSSEC☆41Mar 18, 2016Updated 10 years ago
- Web-based sensor management suite☆20Mar 2, 2023Updated 3 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆24Jan 24, 2020Updated 6 years ago
- Notes and IoCs of fresh malware☆63Jul 5, 2024Updated last year
- ☆24Apr 10, 2024Updated 2 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Ansible playbook for installing MineMeld on Linux☆47Mar 18, 2021Updated 5 years ago
- (Abandoned) Extract packages from an Android device☆53Apr 9, 2021Updated 5 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago