Information-Warfare-Center / CSI-SIEMLinks
CSI SIEM
☆110Updated 2 years ago
Alternatives and similar repositories for CSI-SIEM
Users that are interested in CSI-SIEM are comparing it to the libraries listed below
Sorting:
- an awesome list of active defense resources☆125Updated 5 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆48Updated 7 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆90Updated last year
- Your go-to resource for all things OSINT☆180Updated last year
- ☆69Updated 4 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- ☆72Updated 2 years ago
- Fast IOC and YARA Scanner☆83Updated 5 years ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- ☆53Updated 2 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated last year
- Gather Open-Source Intelligence using PowerShell.☆177Updated 5 years ago
- A list of Autopsy awesome plugins.☆75Updated 3 years ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆82Updated last month
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 2 weeks ago
- Run Velociraptor on Security Onion☆39Updated 3 years ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆254Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆85Updated 4 years ago
- ☆67Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago