Information-Warfare-Center / CSI-SIEMLinks
CSI SIEM
☆110Updated 2 years ago
Alternatives and similar repositories for CSI-SIEM
Users that are interested in CSI-SIEM are comparing it to the libraries listed below
Sorting:
- an awesome list of active defense resources☆126Updated 5 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- Fast IOC and YARA Scanner☆84Updated 5 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆86Updated last month
- ☆70Updated 4 years ago
- ☆93Updated 2 weeks ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 8 years ago
- ☆53Updated 2 years ago
- Your go-to resource for all things OSINT☆180Updated last year
- ☆67Updated 2 months ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆102Updated 3 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Gotanda is browser Web Extension for OSINT.☆196Updated 2 years ago