NVISOsecurity / ee-outliers
Open-source framework to detect outliers in Elasticsearch events
☆203Updated last year
Related projects: ⓘ
- ☆158Updated 3 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆174Updated 3 years ago
- Threat Alert Logic Repository☆88Updated 5 years ago
- a network packet capture compiler☆191Updated 2 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆124Updated 3 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆181Updated last year
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Bro/Zeek integration with osquery☆95Updated 3 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆184Updated 3 years ago
- Extract files from network traffic with Zeek.☆99Updated 4 years ago
- Log Entry to Sigma Rule Converter☆105Updated 2 years ago
- Apache Metron☆59Updated 3 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆280Updated 6 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆148Updated 3 months ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆192Updated last year
- Rule sets for Sagan☆102Updated 3 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆114Updated 5 years ago
- ☆52Updated this week
- How to Zeek Sysmon Logs!☆100Updated 2 years ago
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆139Updated last year
- Main Build directory☆176Updated 5 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆166Updated last year
- Suricata Extreme Performance Tuning guide☆202Updated 6 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆95Updated 8 years ago
- Passive DNS collection using Zeek☆181Updated last year
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆90Updated 6 years ago
- Collaborative Open Playbook Standard☆147Updated last year
- Docker files for building Zeek.☆84Updated 11 months ago
- Searches For Threat Hunting and Security Analytics☆238Updated 3 years ago