G-Research / siembolLinks
An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced security analytics framework.
☆206Updated 2 months ago
Alternatives and similar repositories for siembol
Users that are interested in siembol are comparing it to the libraries listed below
Sorting:
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆148Updated 3 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆151Updated 2 months ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated last month
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 2 months ago
- Threat Hunting & Incident Investigation with Osquery☆208Updated 3 years ago
- Tool to discover external and internal network attack surface☆198Updated last year
- Cloud Security Operations Orchestrator☆185Updated last year
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆90Updated 4 months ago
- Cisco Orbital - Osquery queries by Talos☆131Updated 9 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆164Updated 11 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆297Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Convert Sigma rules to Wazuh rules☆65Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆188Updated 4 years ago
- Wazuh integration TheHive☆35Updated 2 years ago
- A curated list of awesome things related to TheHive & Cortex☆180Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last week
- Build a attack range in your local machine☆131Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆261Updated 2 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆113Updated 2 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- ☆126Updated last year
- firedrill is a malware simulation harness for evaluating your security controls☆184Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆182Updated 9 months ago