CptOfEvilMinions / ChooseYourSIEMAdventureView external linksLinks
☆18Jan 18, 2022Updated 4 years ago
Alternatives and similar repositories for ChooseYourSIEMAdventure
Users that are interested in ChooseYourSIEMAdventure are comparing it to the libraries listed below
Sorting:
- ☆12Jan 28, 2020Updated 6 years ago
- DFIRLab / Plateforme d'investigation numérique☆15Jul 6, 2021Updated 4 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Mar 9, 2022Updated 3 years ago
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- ☆19Aug 4, 2021Updated 4 years ago
- Python 3 bindings for interfacing with LoRa nodes.☆22Oct 17, 2020Updated 5 years ago
- A guide on using Zimbra with Elastic Stack using centralized logging☆27Apr 26, 2023Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- bro on debian with elasticsearch support☆24Mar 27, 2017Updated 8 years ago
- Meer is a "spooler" for Suricata / Sagan.☆30Jun 21, 2023Updated 2 years ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆28Aug 26, 2023Updated 2 years ago
- ☆38Nov 2, 2024Updated last year
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Nov 9, 2022Updated 3 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Jenkins plugin which integrates with Octopus Deploy☆10Dec 12, 2021Updated 4 years ago
- data sanitation services☆12Dec 18, 2024Updated last year
- ☆10Dec 5, 2017Updated 8 years ago
- DNS profile generator for Apple devices.☆45Feb 2, 2026Updated 2 weeks ago
- UDP/TCP Networking for Max/MSP 8+ (nodejs)☆14Nov 27, 2021Updated 4 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Powershell module to help with all file server tasks without using WMI☆12Feb 15, 2024Updated 2 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- Kibana 4 Templates for Suricata IDPS☆33Jul 28, 2016Updated 9 years ago
- Find and Use Cheats via the PythonGDB API☆11Aug 1, 2016Updated 9 years ago
- ☆14Jan 29, 2026Updated 2 weeks ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- A method for parsing Snort Barnyard2 logs from pfSense in Graylog☆10May 26, 2020Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- OpenNCC Frame☆12Oct 21, 2022Updated 3 years ago
- RPI Efergy monitor☆14Sep 17, 2015Updated 10 years ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Renders information for DJs on Twitch☆11Feb 11, 2025Updated last year
- Automation Framework has many tools commonly used for Network Automation☆10Sep 4, 2025Updated 5 months ago