A standard for reducing log volume without sacrificing analytical capability
☆214Feb 21, 2025Updated last year
Alternatives and similar repositories for LogSlash
Users that are interested in LogSlash are comparing it to the libraries listed below
Sorting:
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆389Jan 20, 2026Updated last month
- A repository to share publicly available Velociraptor detection content☆196Feb 22, 2026Updated last week
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 8 months ago
- Transform Linux Audit logs for SIEM usage☆812Feb 22, 2026Updated last week
- OCSF Schema☆783Updated this week
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Production-ready detection & response queries for osquery☆600Aug 13, 2025Updated 6 months ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,658Jan 8, 2025Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated 2 months ago
- Real-time, container-based file scanning at enterprise scale☆975Updated this week
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆324Sep 27, 2024Updated last year
- Tenzir is the data pipeline engine for security teams.☆722Updated this week
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated 11 months ago
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆532Feb 15, 2026Updated last week
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆40Sep 2, 2025Updated 5 months ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Aug 31, 2018Updated 7 years ago
- Synapse Central Intelligence System☆435Feb 20, 2026Updated last week
- ☆21Apr 19, 2024Updated last year
- Sublime rules for email attack detection, prevention, and threat hunting.☆348Updated this week
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆269Mar 17, 2023Updated 2 years ago
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- MDE relies on some of the Audit settings to be enabled☆100Jul 15, 2022Updated 3 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated 11 months ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆768Jan 15, 2026Updated last month
- ☆30Jan 13, 2026Updated last month
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 5 months ago
- ☆2,510Updated this week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆863Jan 20, 2022Updated 4 years ago
- Collaborative Incident Response platform☆1,396Feb 16, 2026Updated last week
- Malware repository component for samples & static configuration with REST API interface.☆376Updated this week
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated last week
- Elastic Security detection content for Endpoint☆1,377Feb 16, 2026Updated last week
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago