CSI SIEM
☆109Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for CSI-SIEM
Users that are interested in CSI-SIEM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆48Apr 26, 2021Updated 5 years ago
- Forensic Imaging quickstarts!☆14Aug 12, 2022Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆462Nov 20, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆42Dec 8, 2022Updated 3 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 5 months ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆19Jul 15, 2025Updated 10 months ago
- Maltego transformation for searching of accounts by username☆85Feb 15, 2022Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Blueteam operational triage registry hunting/forensic tool.☆148Sep 2, 2025Updated 8 months ago
- Analyze Android APK files from a browser.☆14Sep 29, 2020Updated 5 years ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆663May 4, 2023Updated 3 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆229Aug 8, 2023Updated 2 years ago
- Telegram OSINT, Reconnaissance & Chat Analytics Framework.☆74May 15, 2026Updated last week
- A collection of Python resources for Blue Team security work☆17Sep 23, 2018Updated 7 years ago
- NAZAR is an information collection tool (OSINT) which aims to carry out Basic Information. It provides various modules that allow efficie…☆20May 25, 2023Updated 2 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆16Jul 19, 2025Updated 10 months ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆12Oct 29, 2021Updated 4 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆210Apr 3, 2025Updated last year
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- SIEM Tactics, Techiques, and Procedures☆713May 14, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A forensic evidence acquirer☆86Apr 14, 2021Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jun 12, 2022Updated 3 years ago
- PoC of CVE-2022-24707☆13May 3, 2022Updated 4 years ago
- 开源情报收集 导航及快速跳转的油候脚本☆14Jan 10, 2023Updated 3 years ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- ☆70May 3, 2021Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Open Source SIEM (Security Information and Event Management system).☆220Aug 24, 2023Updated 2 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 3 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated this week
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆410Aug 7, 2025Updated 9 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆812May 15, 2026Updated last week
- ☆225Sep 8, 2022Updated 3 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- 😈 The Demon Linux Installer☆30Apr 18, 2021Updated 5 years ago