Prelude-SIEM / prelude-correlator
The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository
☆10Updated 3 years ago
Alternatives and similar repositories for prelude-correlator:
Users that are interested in prelude-correlator are comparing it to the libraries listed below
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- Firepit - STIX Columnar Storage☆16Updated 10 months ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆28Updated 8 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- ☆15Updated 7 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 11 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated last month
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 4 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- Open YARA scan- and search engine☆22Updated last month
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- DefectDojo Community Content☆17Updated 5 months ago
- D4 core software (server and sample sensor client)☆42Updated last year
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25Updated 7 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆23Updated 2 years ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- Scripts to deploy and update MISP in air-gapped environments☆17Updated last month
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆31Updated 10 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago