NVISOsecurity / ee-outliers
Open-source framework to detect outliers in Elasticsearch events
☆207Updated last year
Alternatives and similar repositories for ee-outliers:
Users that are interested in ee-outliers are comparing it to the libraries listed below
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆175Updated 3 years ago
- ☆159Updated 3 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆123Updated 4 years ago
- Threat Alert Logic Repository☆91Updated 5 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆184Updated 3 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆113Updated 6 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆149Updated 7 months ago
- How to Zeek Sysmon Logs!☆101Updated 2 years ago
- a network packet capture compiler☆196Updated 2 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆195Updated last year
- Searches For Threat Hunting and Security Analytics☆240Updated 3 years ago
- Django web interface for managing Yara rules☆190Updated 6 years ago
- ☆219Updated last year
- An open standard for hashing network flows into identifiers, a.k.a "Community IDs".☆173Updated 3 months ago
- Automated Use Case Testing☆165Updated 6 years ago
- Extract files from network traffic with Zeek.☆99Updated 4 years ago
- Suricata Extreme Performance Tuning guide☆205Updated 6 years ago
- A Splunk app to use MISP in background☆109Updated 2 months ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆179Updated 3 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆288Updated 7 years ago
- Log Entry to Sigma Rule Converter☆107Updated 2 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆90Updated 7 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆204Updated 4 years ago
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- Documentation of Cortex☆170Updated last year