Graylog2 / graylog-guide-ossecLinks
How to write OSSEC alerts into Graylog
☆12Updated 3 months ago
Alternatives and similar repositories for graylog-guide-ossec
Users that are interested in graylog-guide-ossec are comparing it to the libraries listed below
Sorting:
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆56Updated this week
- ☆49Updated 10 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- Dockerfiles for containerized osquery☆14Updated 8 years ago
- MISP - Ansible installation script☆23Updated 6 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 7 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Updated 2 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆32Updated 7 years ago
- Docker files for Security Onion☆42Updated 5 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Automated daily scan using Nmap and report on the differences☆92Updated 7 years ago
- The currently released SimpleRisk source code.☆99Updated 2 months ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Install and configure user mode auditd tools☆34Updated 2 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- ☆52Updated 6 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Packer.io Scripts to build the SIFT VM(s)☆10Updated 5 years ago
- Central correlator for opencanary instances☆17Updated 4 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 9 months ago
- Example configuration files for Logstash☆44Updated 6 years ago
- Simple Docker-based quickstart for osquery, Fleet, and ELK stack☆64Updated 2 years ago
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆17Updated 9 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 8 years ago
- ☆34Updated 4 years ago
- ☆15Updated 6 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Updated 5 years ago