SHolzhauer / elastic-tipLinks
Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common format into Elasticsearch with the main goal of being used by the Security solution.
☆28Updated last year
Alternatives and similar repositories for elastic-tip
Users that are interested in elastic-tip are comparing it to the libraries listed below
Sorting:
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
 - Unofficial third-party scripts, playbooks, and content for IBM QRadar & QRadar Community Edition.☆86Updated 5 months ago
 - A curated list of awesome things related to TheHive & Cortex☆182Updated 4 years ago
 - Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
 - SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆93Updated 3 years ago
 - Run Velociraptor on Security Onion☆40Updated 3 years ago
 - The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
 - Run zeek with zeekctl in docker☆55Updated last year
 - ☆37Updated 4 years ago
 - Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Updated 8 years ago
 - PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated last month
 - Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
 - A live dashboard for a real-time overview of threat intelligence from MISP instances☆204Updated 2 years ago
 - ☆91Updated last week
 - Mapping Corelight or Zeek data to Elastic Common Schema fields☆34Updated last month
 - All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
 - Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆78Updated 2 weeks ago
 - Wazuh - Splunk App☆56Updated last year
 - A website and framework for testing NIDS detection☆57Updated 4 years ago
 - The FASTEST way to consume threat intel.☆69Updated 2 years ago
 - Zeek Log Cheatsheets☆297Updated 2 months ago
 - Convert Sigma rules to Wazuh rules☆73Updated last month
 - Salt States for Configuring the SIFT Workstation☆107Updated 2 weeks ago
 - ☆119Updated this week
 - Passive service locator, a python sniffer that identifies servers, clients, names and much more☆254Updated 2 years ago
 - misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
 - Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
 - automate your MISP installs☆68Updated 5 years ago
 - ☆55Updated 4 years ago
 - Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year