☆18Jan 18, 2022Updated 4 years ago
Alternatives and similar repositories for ChooseYourSIEMAdventure
Users that are interested in ChooseYourSIEMAdventure are comparing it to the libraries listed below
Sorting:
- ☆12Jan 28, 2020Updated 6 years ago
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- ☆19Aug 4, 2021Updated 4 years ago
- Python 3 bindings for interfacing with LoRa nodes.☆22Oct 17, 2020Updated 5 years ago
- A guide on using Zimbra with Elastic Stack using centralized logging☆27Apr 26, 2023Updated 2 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- bro on debian with elasticsearch support☆24Mar 27, 2017Updated 8 years ago
- Meer is a "spooler" for Suricata / Sagan.☆30Jun 21, 2023Updated 2 years ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆28Aug 26, 2023Updated 2 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- ☆38Nov 2, 2024Updated last year
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- UDP/TCP Networking for Max/MSP 8+ (nodejs)☆14Nov 27, 2021Updated 4 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- ☆44Jul 11, 2025Updated 7 months ago
- Kibana 4 Templates for Suricata IDPS☆33Jul 28, 2016Updated 9 years ago
- The hub for all JATS4R meeting notes, examples, draft recommendations, documents, and issues.☆17Sep 8, 2019Updated 6 years ago
- AppNet.link local STUN proxy☆15May 11, 2020Updated 5 years ago
- Automation Framework has many tools commonly used for Network Automation☆10Sep 4, 2025Updated 6 months ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Ancient two-player strategy race board game☆12Mar 19, 2024Updated last year
- ☆14Sep 28, 2023Updated 2 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- Repository for integration with Apache Kafka☆14Jul 22, 2022Updated 3 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- Scripts and ideas shared with the community.☆14Feb 27, 2026Updated last week
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- ☆10Feb 16, 2018Updated 8 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- Total Anomaly Detection System for software logs and traces☆10Dec 7, 2015Updated 10 years ago
- This package allows the use of a custom Elastalert Alert which creates alerts with observables in TheHive using TheHive4Py.☆26May 18, 2021Updated 4 years ago
- Contains the sample code for the "Best Practices for Measuring Your Code Pipeline" webinar☆18Aug 30, 2019Updated 6 years ago