Security-Experts-Community / siem-monkeyLinks
Chrome extension for SOC automations
☆35Updated 2 months ago
Alternatives and similar repositories for siem-monkey
Users that are interested in siem-monkey are comparing it to the libraries listed below
Sorting:
- Enterprise Response Model & Common Knowledge☆38Updated 2 months ago
- реп полезностей для PT MaxPatrol SIEM☆24Updated 2 years ago
- System of Orchestration, Lifecycle control, Detection and Response☆60Updated last year
- Открытый репозиторий с правилами на языке eXtraction and Processing (XP)☆26Updated 4 months ago
- MP SIEM SDK☆28Updated 7 months ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆17Updated 10 months ago
- ☆134Updated 4 years ago
- Extension for eXtraction and Processing (XP) language in Visual Studio Code☆43Updated 3 weeks ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆164Updated 3 weeks ago
- ☆20Updated 4 years ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆91Updated 3 years ago
- A repository with data about APTs☆13Updated 2 years ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆463Updated 10 months ago
- A monster cheatsheet on MITM attacks☆365Updated 3 months ago
- Hackings style defence tricks☆43Updated last week
- Another Hardening Windows Tool☆51Updated last year
- NTP Exfiltration Tool☆146Updated last year
- LOKI2 - Simple IOC and YARA Scanner☆102Updated 2 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆198Updated last year
- Light-weight web security scanner☆151Updated 6 months ago
- A tool to recover content from files encrypted with intermittent encryption☆237Updated 7 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆744Updated 5 months ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 4 months ago
- Sigma rule specification☆149Updated 2 weeks ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆229Updated 11 months ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆38Updated 10 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆202Updated this week
- ☆69Updated 4 years ago
- Detection of Log4j in memory☆39Updated 3 years ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆242Updated this week