☆34Apr 29, 2021Updated 5 years ago
Alternatives and similar repositories for elastic_stack
Users that are interested in elastic_stack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contains Logstash related content including tons of Logstash configurations☆254Aug 25, 2021Updated 4 years ago
- ☆134Mar 21, 2024Updated 2 years ago
- ☆50Aug 30, 2020Updated 5 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- This is a repository for freq.py and freq_server.py☆220Feb 1, 2026Updated 2 months ago
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆16Dec 8, 2022Updated 3 years ago
- Reflex SOAR☆12Apr 1, 2022Updated 4 years ago
- Scripts for Looking up OUIs or Vendor information from MAC addresses☆11Dec 24, 2023Updated 2 years ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Feb 20, 2018Updated 8 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- SEC599 supporting GitHub repository☆16Sep 14, 2019Updated 6 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Cloud Templates and scripts to deploy mordor environments☆130Mar 3, 2021Updated 5 years ago
- a library of Logstash pipeline configuration files mapping data to the Elastic Common Schema☆10Feb 28, 2021Updated 5 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 5 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Attack Range to test detection against nativel serverless cloud services and environments☆35Sep 8, 2021Updated 4 years ago
- Falcon Integration Gateway (FIG)☆25Mar 5, 2026Updated last month
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆324Jan 22, 2021Updated 5 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Sep 30, 2016Updated 9 years ago
- Philly Security Shell meetup demo and related files☆32Apr 15, 2019Updated 7 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Logging Made Easy☆708Nov 1, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆227Nov 9, 2023Updated 2 years ago
- Virtual machine creation script for VMWare Fusion on Mac OS X☆11May 3, 2016Updated 9 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Jun 19, 2017Updated 8 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Create actionable data from your Vulnerability Scans☆1,394Dec 27, 2022Updated 3 years ago