YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack
☆16Jan 6, 2021Updated 5 years ago
Alternatives and similar repositories for YetiToElastic
Users that are interested in YetiToElastic are comparing it to the libraries listed below
Sorting:
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- A solution for using the ElastiFlow Unified Collector with the Elastic Stack (Elasticsearch and Kibana).☆25Nov 10, 2025Updated 3 months ago
- ☆12Apr 23, 2020Updated 5 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- ☆14May 30, 2018Updated 7 years ago
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 4 months ago
- 简单易用的查询elasticsearch数据根据规则报警工具☆17Jun 29, 2018Updated 7 years ago
- Ansible playbook for installing MineMeld on Linux☆47Mar 18, 2021Updated 4 years ago
- Converts Netwitness log parser configuration to Logstash configuration☆20Sep 10, 2020Updated 5 years ago
- Web-based sensor management suite☆20Mar 2, 2023Updated 2 years ago
- 获取系统KB补丁对于的MS 号☆24Aug 18, 2019Updated 6 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Oct 30, 2024Updated last year
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Jul 21, 2020Updated 5 years ago
- Detect kerberos attacks in pcap files☆29Dec 13, 2015Updated 10 years ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- A golang client of our webshell scanner API☆28Mar 9, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Malware management program and tools☆27Dec 16, 2015Updated 10 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆245Feb 11, 2026Updated 2 weeks ago
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆32Sep 19, 2019Updated 6 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Nov 11, 2023Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Sep 9, 2020Updated 5 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 6 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- 手工盲注辅助注入工具☆34Sep 16, 2018Updated 7 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- Elemental - An ATT&CK Threat Library☆318Dec 8, 2022Updated 3 years ago
- Suricata rules for Emerging Threats and funkyness☆75May 15, 2017Updated 8 years ago
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago
- Prototypes for MineMeld nodes☆38Oct 15, 2021Updated 4 years ago
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- ☆11Dec 5, 2022Updated 3 years ago