ESGuardian / LittleBeatLinks
Потом объясню, что это такое
☆15Updated 7 years ago
Alternatives and similar repositories for LittleBeat
Users that are interested in LittleBeat are comparing it to the libraries listed below
Sorting:
- Monitoring attacks with elastick, kibana, grok, logstash and beats☆20Updated 8 years ago
- Lightweight and sexy Security Information and Event Managment system for OSSEC, Snort and other IDS/IPS☆109Updated 4 years ago
- Zabbix vulnerability assessment plugin☆218Updated 3 months ago
- ☆23Updated 6 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆106Updated last year
- Kibana 5 Templates for Suricata IDPS☆43Updated 7 years ago
- setup zeek, previously Bro IDS☆18Updated 3 months ago
- Logstash Configuration for Linux Logs (Authentication, Apache, Mail)☆93Updated 5 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- Detection of Log4j in memory☆40Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 3 weeks ago
- This package allows the use of a custom Elastalert Alert which creates alerts with observables in TheHive using TheHive4Py.☆27Updated 4 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 4 years ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Updated 2 years ago
- App for storing FireHOL feeds (https://github.com/firehol/blocklist-ipsets) with a history of adding and removing each address☆33Updated 2 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆110Updated 6 months ago
- Example configuration files for Logstash☆44Updated 5 years ago
- CEF ( Common Event Format ) exporting app for Splunk written in python☆15Updated 11 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- System of Orchestration, Lifecycle control, Detection and Response☆60Updated last year
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 4 years ago
- Add POST body excerpt to Bro's HTTP log☆14Updated last year
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆196Updated 11 months ago
- Kibana 4 Templates for Suricata IDPS☆33Updated 9 years ago
- MineMeld nodes for MISP☆19Updated last year
- OwlH Master API☆24Updated 3 months ago
- Утилита от R-Vision для нахождения систем, уязвимых для шифровальщика WannaCry☆29Updated 8 years ago
- WebUI of MineMeld☆43Updated 2 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago