NVISOsecurity / ee-outliersLinks
Open-source framework to detect outliers in Elasticsearch events
☆209Updated 2 years ago
Alternatives and similar repositories for ee-outliers
Users that are interested in ee-outliers are comparing it to the libraries listed below
Sorting:
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆123Updated 4 years ago
- ☆165Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆456Updated 2 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆175Updated 4 years ago
- Automated Use Case Testing☆168Updated 7 years ago
- Log Entry to Sigma Rule Converter☆109Updated 3 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- a network packet capture compiler☆202Updated 3 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆154Updated 3 months ago
- Searches For Threat Hunting and Security Analytics☆239Updated 6 months ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆197Updated 8 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆209Updated 5 years ago
- A website and framework for testing NIDS detection☆57Updated 4 years ago
- Rule sets for Sagan☆105Updated 4 years ago
- Apache Metron☆60Updated 4 years ago
- ☆222Updated last year
- Collaborative Open Playbook Standard☆157Updated 2 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Detecting Lateral Movement with Machine Learning☆138Updated 7 years ago
- Extract files from network traffic with Zeek.☆102Updated 5 years ago
- Threat Intelligence APIs☆281Updated 2 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago