CommunityHoneyNetwork / chn-quickstartLinks
Helpers for getting CHN up and running through the Quickstart guide
☆12Updated 4 years ago
Alternatives and similar repositories for chn-quickstart
Users that are interested in chn-quickstart are comparing it to the libraries listed below
Sorting:
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- ☆56Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 9 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- automate your MISP installs☆68Updated 5 years ago
- Corelight@Home script☆45Updated 2 years ago
- ☆37Updated 5 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- ☆227Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 4 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Wrap any binary into a cached webserver☆57Updated 3 years ago
- ☆50Updated 5 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- Files vetted, and approved for public release☆55Updated 2 years ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆102Updated 6 years ago
- Volatility plugins developed and maintained by the community☆21Updated last year
- ☆34Updated 4 years ago
- Taranis☆64Updated 4 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- A free incident response management and documentation workbook☆25Updated 7 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆100Updated 4 years ago
- ☆33Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago
- ☆39Updated 5 years ago
- ☆29Updated 4 years ago