An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced security analytics framework.
☆208Apr 3, 2025Updated 11 months ago
Alternatives and similar repositories for siembol
Users that are interested in siembol are comparing it to the libraries listed below
Sorting:
- ☆44Aug 3, 2021Updated 4 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Oct 30, 2023Updated 2 years ago
- Phishing Framework for Pentesters☆201May 16, 2023Updated 2 years ago
- Cloud Security Operations Orchestrator☆188Apr 17, 2024Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆199Aug 29, 2024Updated last year
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- Unlocking Serverless Computing to Assess Security Controls☆261Mar 15, 2024Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆256Apr 6, 2024Updated last year
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Enables Zeek to communicate with Tenzir☆11Jul 20, 2023Updated 2 years ago
- Set of tools for security testing of Internet of Things devices using specific network IoT protocols☆358May 31, 2024Updated last year
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Nov 10, 2022Updated 3 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Jul 31, 2021Updated 4 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆785Feb 22, 2026Updated last week
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated last week
- Security event correlation engine for ELK stack☆447Jun 26, 2024Updated last year
- This project is a SIEM with SIRP and Threat Intel, all in one.☆461Nov 20, 2024Updated last year
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- Sysmon EDR POC Build within Powershell to prove ability.☆223May 1, 2021Updated 4 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- A Blazing fast Security Auditing tool for Kubernetes☆1,006Apr 6, 2024Updated last year
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,549Feb 10, 2026Updated 3 weeks ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Feb 14, 2025Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated 11 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Jul 19, 2024Updated last year
- Tenzir is the data pipeline engine for security teams.☆725Updated this week