G-Research / siembol
An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced security analytics framework.
☆200Updated last month
Related projects ⓘ
Alternatives and complementary repositories for siembol
- Tool to discover external and internal network attack surface☆192Updated 6 months ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆244Updated 2 weeks ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆147Updated 2 years ago
- Threat Hunting & Incident Investigation with Osquery☆198Updated 2 years ago
- Cloud Security Operations Orchestrator☆182Updated 7 months ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆161Updated 5 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆194Updated 2 years ago
- Cisco Orbital - Osquery queries by Talos☆123Updated 2 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆275Updated 6 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆122Updated 6 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆141Updated last year
- A Docker container for remote penetration testing.☆133Updated 3 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆282Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆123Updated 8 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆175Updated 3 months ago
- A curated list of awesome things related to TheHive & Cortex☆173Updated 3 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆181Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆105Updated 2 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆113Updated last year
- Threat Hunting tool about Sysmon and graphs☆329Updated last year
- ☆114Updated last year
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆72Updated 2 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆72Updated 2 weeks ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆256Updated this week
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆193Updated 4 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆159Updated this week