CSI SIEM
☆109Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for CSI-SIEM
Users that are interested in CSI-SIEM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search-Scan-Save-Notify☆11May 12, 2025Updated 10 months ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆48Apr 26, 2021Updated 4 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆14May 5, 2025Updated 10 months ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆461Nov 20, 2024Updated last year
- ☆42Dec 8, 2022Updated 3 years ago
- open-source intelligence gathering for SIEMs <3☆38Feb 16, 2017Updated 9 years ago
- Maltego transformation for searching of accounts by username☆79Feb 15, 2022Updated 4 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 3 months ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 8 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 6 months ago
- For Public Objects☆21Oct 27, 2024Updated last year
- Analyze Android APK files from a browser.☆15Sep 29, 2020Updated 5 years ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆660May 4, 2023Updated 2 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆226Aug 8, 2023Updated 2 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- Framework for Telegram users and chats investigating☆75Jun 5, 2025Updated 9 months ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- NAZAR is an information collection tool (OSINT) which aims to carry out Basic Information. It provides various modules that allow efficie…☆19May 25, 2023Updated 2 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 8 months ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- SIEM Tactics, Techiques, and Procedures☆704Updated this week
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jun 12, 2022Updated 3 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- ☆69May 3, 2021Updated 4 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Open Source SIEM (Security Information and Event Management system).☆220Aug 24, 2023Updated 2 years ago
- Web Service write in Python for control and protect your android device remotely.☆191Dec 14, 2022Updated 3 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 2 years ago
- ☆28Jun 18, 2019Updated 6 years ago