Security-Experts-Community / siem-monkey
Chrome extension for SOC automations
☆34Updated 2 weeks ago
Alternatives and similar repositories for siem-monkey
Users that are interested in siem-monkey are comparing it to the libraries listed below
Sorting:
- Enterprise Response Model & Common Knowledge☆36Updated 11 months ago
- реп полезностей для PT MaxPatrol SIEM☆24Updated last year
- MP SIEM SDK☆25Updated 3 months ago
- System of Orchestration, Lifecycle control, Detection and Response☆58Updated last year
- Открытый репозиторий с правилами на языке eXtraction and Processing (XP)☆20Updated last month
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆15Updated 6 months ago
- Extension for eXtraction and Processing (XP) language in Visual Studio Code☆42Updated last month
- ☆20Updated 3 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆113Updated this week
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 8 months ago
- A repository with data about APTs☆12Updated 2 years ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆146Updated 2 weeks ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆127Updated 9 months ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆89Updated 3 years ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆177Updated this week
- RedTeam network tool based on OrangePi R1☆23Updated 3 months ago
- ☆65Updated 4 years ago
- Sigma rule specification☆134Updated 2 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆190Updated last year
- ☆131Updated 3 years ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆31Updated 6 months ago
- Detection of Log4j in memory☆39Updated 3 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆197Updated 3 months ago
- LOKI2 - Simple IOC and YARA Scanner☆93Updated 9 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆153Updated 2 months ago
- ☆228Updated last year
- Набор скриптов для парсинга агрегаторов уязвимостей и выгрузки информации в YouTrack☆28Updated last year
- Sample evtx files to use for testing hayabusa detection rules☆54Updated 6 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆374Updated last month