Graylog2 / graylog-guide-ossec
How to write OSSEC alerts into Graylog
☆11Updated 8 years ago
Related projects: ⓘ
- Docker Automated Build for Security Testing Tools☆14Updated 2 years ago
- Modern Honey Network deployment with ansible☆12Updated 2 years ago
- Dockerfiles for containerized osquery☆13Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 6 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- MISP - Ansible installation script☆22Updated 5 years ago
- ☆32Updated this week
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Periodically scan target ranges using nmap, ndiff and emailing changes☆10Updated 7 years ago
- Useful Powershell modules.☆11Updated 7 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- DevSec Windows Patch Baseline - InSpec Profile☆47Updated last month
- ☆16Updated this week
- little scripts created during my time as a pentetration tester☆32Updated 12 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆28Updated 6 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆51Updated 2 months ago
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆16Updated 8 years ago
- Scripts that are suited for blue teams☆33Updated 8 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 6 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆9Updated 6 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated last year
- [DEPRECATED] CEF (Common Event Format) input plugin for Graylog☆10Updated 3 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- ☆12Updated this week
- Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689☆16Updated 7 months ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- Lair Framework dockerized.☆37Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago