A standard for reducing log volume without sacrificing analytical capability
☆216Feb 21, 2025Updated last year
Alternatives and similar repositories for LogSlash
Users that are interested in LogSlash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆395Jan 20, 2026Updated 2 months ago
- A repository to share publicly available Velociraptor detection content☆202Apr 7, 2026Updated last week
- Transform Linux Audit logs for SIEM usage☆824Mar 5, 2026Updated last month
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OCSF Schema☆805Updated this week
- Production-ready detection & response queries for osquery☆603Updated this week
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,668Jan 8, 2025Updated last year
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 9 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- Real-time, container-based file scanning at enterprise scale☆981Mar 19, 2026Updated 3 weeks ago
- AYY LMAO☆22Mar 26, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Tenzir is the data pipeline engine for security teams.☆734Updated this week
- MDE relies on some of the Audit settings to be enabled☆100Jul 15, 2022Updated 3 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 7 months ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆539Updated this week
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆787Mar 25, 2026Updated 2 weeks ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Aug 31, 2018Updated 7 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆41Sep 2, 2025Updated 7 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated last year
- Open Source Security Events Metadata (OSSEM)☆1,289Feb 27, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- YARA rule analyzer to improve rule quality and performance☆112Jan 18, 2026Updated 2 months ago
- Golang io/fs implementation for Google Cloud Storage☆13Jan 20, 2024Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆867Jan 20, 2022Updated 4 years ago
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆326Sep 27, 2024Updated last year
- Audit log wall of shame.☆42Aug 20, 2025Updated 7 months ago
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- Synapse Central Intelligence System☆437Updated this week
- Collaborative Incident Response platform☆1,465Updated this week
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated last year
- Picatrix is a library designed to help security analysts in a notebook environment, such as colab or jupyter.☆52Mar 26, 2025Updated last year
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Elastic Security detection content for Endpoint☆1,399Updated this week
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,295Updated this week
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated 3 weeks ago