Security-Experts-Community / siem-monkeyLinks
Chrome extension for SOC automations
☆37Updated 3 months ago
Alternatives and similar repositories for siem-monkey
Users that are interested in siem-monkey are comparing it to the libraries listed below
Sorting:
- Enterprise Response Model & Common Knowledge☆39Updated 6 months ago
- реп полезностей для PT MaxPatrol SIEM☆24Updated 2 years ago
- System of Orchestration, Lifecycle control, Detection and Response☆61Updated 2 years ago
- MP SIEM SDK☆30Updated 3 weeks ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆18Updated last year
- Открытый репозиторий с правилами на языке eXtraction and Processing (XP)☆28Updated 3 months ago
- ☆20Updated 4 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆127Updated 3 weeks ago
- Detection of Log4j in memory☆40Updated 4 years ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆178Updated last month
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆91Updated 3 years ago
- ☆70Updated 4 years ago
- ☆136Updated 4 years ago
- Another Hardening Windows Tool☆51Updated last year
- https://t.me/+V6d8SvKVFXo2MjIy☆41Updated 2 years ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆463Updated last year
- sorted russian names/surnames wordlists☆75Updated 11 months ago
- Hackings style defence tricks☆56Updated last week
- A repository with data about APTs☆13Updated 3 years ago
- A tool to recover content from files encrypted with intermittent encryption☆240Updated 10 months ago
- NTP Exfiltration Tool☆147Updated 2 years ago
- Sigma rule specification☆164Updated 3 weeks ago
- ☆56Updated 2 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Updated last year
- Light-weight web security scanner☆150Updated last month
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated 2 years ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆211Updated 2 weeks ago
- A monster cheatsheet on MITM attacks☆367Updated 7 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆771Updated 9 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago