SMAPPER / NSMLinks
This repository is created to add value to existing Network Security Monitoring solutions.
☆17Updated 8 years ago
Alternatives and similar repositories for NSM
Users that are interested in NSM are comparing it to the libraries listed below
Sorting:
- ☆49Updated 4 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- ☆30Updated 6 years ago
- ☆34Updated 4 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- automate your MISP installs☆68Updated 5 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- ☆13Updated 5 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Expert Investigation Guides☆52Updated 4 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 9 months ago
- ☆13Updated 7 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- incident response scripts☆19Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Updated 5 years ago
- ☆16Updated 4 years ago
- ☆55Updated 3 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- ☆36Updated 4 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 3 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago